Please wait a minute...

Current Issue

    25 November 2007, Volume 28 Issue 11
    Academic paper
    Solution of secure multi-party multi-data raking problem based on El Gamal encryption
    Wen LIU,Shou-shan LUO,Ping CHEN
    2007, 28(11):  1-5.  doi:1000-436X(2007)11-0001-05
    Asbtract ( 0 )   HTML ( 1)   PDF (1428KB) ( 482 )   Knowledge map   
    References | Related Articles | Metrics

    Based on El Gamal homomorphic encryption,a protocol of secure multi-party multi-data ranking problem was proposed.The problem extended millionaires' problem.Furthermore,the correctness and security of this protocol were shown in semi-honest model,using the definition of secure multi-party computation.The solution of secure multi-party multi-data ranking problem can form a fundamental basis of new-style electronic transaction,such as private biding and auction,secret online transaction and so on.

    New approach to evaluate the capacity of signature-based intrusion detection systems
    Mei-feng SUN,Jian GONG,Wang YANG
    2007, 28(11):  6-14.  doi:1000-436X(2007)11-0006-09
    Asbtract ( 0 )   HTML ( 1)   PDF (847KB) ( 284 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For improving the accuracy of IDS evaluation,after the detection method of signature-based IDS was analyzed,pointed out that the current methods are not reasonable,and proposed the principle to evaluate the capability of IDS implementation and the capability of rule base respectively.The method to evaluate the capability of IDS implementation,which views the human knowledge as parameters,was introduced.The definition of metrics and how to calculate the value of metrics are mainly discussed.A prototype was implemented which shows that this new method can evaluate the real capacity better for a signature-based IDS.

    Improved sphere decoding algorithm based on ±1 quadratic programming
    Zi LI,Yue-ming CAI
    2007, 28(11):  15-20.  doi:1000-436X(2007)11-0015-06
    Asbtract ( 0 )   HTML ( 1)   PDF (1372KB) ( 180 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the ±1 quadratic programming of the MIMO detection,the necessary conditions for MIMO detection optimal solution were derived.An improved sphere decoding algorithm based on these necessary conditions was proposed.The algorithm prunes redundant nodes by necessary conditions based on the origin sphere decoding.With this pruning strategy,the complexity of algorithm is reduced significantly,while holding the bit error rate performance.

    Provably secure authentication protocol for heterogeneous wireless networks
    Ya-hui LI,Feng-hua LI,Wei-dong YANG,Jian-feng MA
    2007, 28(11):  21-26.  doi:1000-436X(2007)11-0021-09
    Asbtract ( 75 )   HTML ( 1)   PDF (617KB) ( 614 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Security of heterogeneous wireless networks has attracted the attention of researchers.Considering security and efficiency problems on EAP-AKA protocol in the 3G-WLAN interworking networks,an authentication protocol based on a way of offline billing was proposed.It verified the identity of WLAN access network to prevent the re-direction attack,and used the localized authentication mechanism to reduce the message transmission delay and improve the efficiency of reauthentication process.Simulation results show that the average message transmission delay of the proposed protocol is about half shorter than that of EAP-AKA.By analyzing the security of the proposed protocol with Canetti-Krawczyk(CK)model,it proves that the proposed protocol satisfy the definition of Session Key security defined in the CK model.

    Link stability metric based on mobility prediction model in mobile ad hoc networks
    HANGHui Z,ONGYu-ning D
    2007, 28(11):  27-34.  doi:1000-436X(2007)11-0030-08
    Asbtract ( 106 )   HTML ( 1)   PDF (1239KB) ( 323 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A mobility prediction model based stable link selection algorithm was proposed in which stable neighbor metric and local movement metric were defined.Mobility prediction model was applied to predict stability probabilities between each local node and its neighbors by using those two metrics and LZ78 algorithm so as to find the most stable neighbor of each local node and most stable route in a route discovery.The simulation results show that the algorithm outperforms the histogram algorithm and the lowest ID algorithm in selecting stable links.

    Complementary matrix–based algorithm for data hiding
    Ren-yi TANG,Yong-fu ZHANG,Jin-hai SU
    2007, 28(11):  35-40.  doi:1000-436X(2007)11-0038-06
    Asbtract ( 64 )   HTML ( 1)   PDF (1013KB) ( 222 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The complementary matrix–based algorithm for data hiding presented does a good job at capacity of data hiding and data security.The proposed algorithm can conceal as many as [lb2n] bits data in n bits host data stream,by changing,averagely,[(3/2) ?(1/2m-1)] bits.There are so many kinds of complementary matrices,and the secret key is only shared by the sender and extractor,so the algorithm is very secure.

    Active layered localization method for dynamic muti-sinks wireless sensor networks
    Peng HAN,Hua-feng WU,Jiu-chun REN,Chuan-shan GAO
    2007, 28(11):  41-47.  doi:1000-436X(2007)11-0044-07
    Asbtract ( 80 )   HTML ( 1)   PDF (1320KB) ( 351 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An active layered localization method was proposed.The method was event-driven and divided into two layers (sensor layer and sink layer).The method not only supported the movement of nodes,but also reduced the localization cost of sensors and extended the network lifetime.

    Two-level cache based streaming media scheduling algorithm for mobile network
    Jian-xin LIAO,Bo YANG,Xiao-min ZHU,Chun WANG
    2007, 28(11):  48-55.  doi:1000-436X(2007)11-0051-08
    Asbtract ( 55 )   HTML ( 1)   PDF (812KB) ( 312 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA (two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS (two-level cache based mobile streaming scheduling) was designed; mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.

    Verifiable multi-secret sharing schemes applicable to arbitrary access structures
    Fu-tai ZHANG,Yu-min WANG
    2007, 28(11):  56-61.  doi:1000-436X(2007)11-0059-06
    Asbtract ( 63 )   HTML ( 1)   PDF (710KB) ( 160 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable secret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the following properties:multiple secrets can be shared at the same time in a group of shareholders.The secret shares sent to shareholders are publicly verifiable.The public information with respect to each shared secret is publicly verifiable.And the supply of false shares in the process of secret recovery can be prevented.Analysis shows that the verifiable multi-secret sharing schemes constructed by our method are not only secure,but also efficient.

    Adaptive iterative bit allocation algorithm for MIMO-OFDM system
    Ling-yan FAN,Chen HE,Guo-rui FENG
    2007, 28(11):  62-67.  doi:1000-436X(2007)11-0065-06
    Asbtract ( 39 )   HTML ( 1)   PDF (1309KB) ( 437 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The adaptive iterative modulation was proposed for multiple-input-multiple-output-orthogonal frequency division multiplexed (MIMO-OFDM) system.An adaptive minimum transmit power modulation scheme under constant data rate and fixed bit error rate (BER) for the MIMO-OFDM system was proposed to adjust the modulation order and allocates the transmit power to each spatial sub-channel by iterative method considering the requirement of the practical communication system.It can meet the user's requirements and get better freguency efficiency at the cost of minimum transmission power.And it can avoid the error by round the modulation order.Computer simulation results present the efficiency of the proposed scheme.

    Researches on mobile IP position management based on multicast network collaboration
    Jian-sheng XUE,Lin-yi WAN,Guang-xing WANG
    2007, 28(11):  68-72.  doi:1000-436X(2007)11-0071-05
    Asbtract ( 62 )   HTML ( 1)   PDF (702KB) ( 177 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A method of mobile IP position management which uses group managing function in multicast was proposed.Mobile agent (MA) was set in each autonomous network to form a VPN that manage the position binding information of mobile nodes.By putting nodes together for communicating with mobile host to make a multicast tree,the position binding information of mobile nodes was maintained through the collaborative work of each node in network.The storage structure of binding information table and the algorithm on how to manage mobile position binding information were designed.Simulation shown that the method proposed can make correspondent nodes understand mobile node's care-of address (CoA) in real-time,decrease registration time and times,decrease transmission delay,for supporting real-time service wonderfully.At the same time,the loads of home agent and hosts are alleviated.The performance of mobile IP is optimized.

    Autocorrelation based channel estimation method for space-time block coding system
    Ren-dong YING,Guo-zhi XU
    2007, 28(11):  73-77.  doi:1000-436X(2007)11-0076-05
    Asbtract ( 39 )   HTML ( 1)   PDF (1051KB) ( 151 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An autocorrelation based method was proposed to estimate the channel of the space-time block coding (STBC) system.It is shown that when the inputted symbol vector is spatially white,the autocorrelation of the received signal has specific structure due to the orthogonal property of STBC system.From the eigenvector of the autocorrelation matrix,the channel information can be estimated up to a scalar.When the autocorrelation matrix satisfies certain condition,the estimation procedure could be further simplified and the channel was obtained directly from the autocorrelation matrix without any matrix inverse or decomposition operation.

    Technical Report
    Research of single sign-on in grid
    Fan-rong MENG,Hong-xia XIE,Ru-chuan WANG,Shi-xiong XIA
    2007, 28(11):  78-83.  doi:1000-436X(2007)11-0081-06
    Asbtract ( 70 )   HTML ( 1)   PDF (810KB) ( 370 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Grid was a kind of new-type network computing platform following World Wide Web; An infrastructure of sharing different resources including webpage in an all-round way was offered.In order to complete one task,many resources were often needed the participants to assort with,so single sign-on to simplify users' operations was needed.The disadvantages of single sign-on were analyzed,and a solution based on SAML was proposed,the test and the performance evaluation to it had been carried on.

    Network-based malcode detection technology
    Bing WU,Xiao-chun YUN,Qi GAO
    2007, 28(11):  84-88.  doi:1000-436X(2007)11-0087-05
    Asbtract ( 97 )   HTML ( 5)   PDF (716KB) ( 538 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Following the analysis for traditional distributed IDS,disadvantages that applying structure of multiple engine and small rules set to detect network-level malcode were pointed out,which is based on detailed protocol decoding.Detection model and anti-malcode markup language of network-level malcode were designed for single engine and big rules set.The characteristics of network data flow were analyzed.By optimization of patterns,frequent collisions between suffix with data flow and unbalanced branched of chained list were avoided.The efficiency by using WM algorithm to detect malcode on network level can be remarkably increased.

    MP-Start:bandwidth measurement based and phase-divided TCP slow start mechanism
    Xiao-heng DENG,Zhi-gang CHEN,Lian-ming ZHANG,Bi-qing ZENG
    2007, 28(11):  89-99.  doi:1000-436X(2007)11-0092-11
    Asbtract ( 86 )   HTML ( 1)   PDF (2458KB) ( 767 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To set appropriate threshold value(ssthresh) of slow start and eliminate network oscillation caused by bursty traffic,a new measurement-based and phase-divided slow start mechanism was proposed,which was called MP-Start.MP-Start employs effective online bandwidth measurement technology to update the ssthresh with appropriate value dynamically,and adjusts the increment of congestion window(cwnd) in different phase of the startup.MP-Start increases cwnd with half of the difference between ssthesh and cwnd,iterates and gradually closes up ssthresh,of which the increment is small at start phase and end phase and comparatively large at the middle phase of the startup of a connection,the largest increment is no more than one quarter of ssthresh.In order to improve the performance of this algorithm,a flexible parameterized model and an adaptive parameter setting solution are designed.And series simulation experiments indicate that MP-Start significantly decreases dropped packets,data transforming time,packet queue length of shared link,and also improves network performance and smoothness of connections.

    Research on multi-source application level multicast for awareness driven virtual space teleconferencing
    Xu ZHANG,Hui-zhong WU
    2007, 28(11):  100-107.  doi:1000-436X(2007)11-0103-08
    Asbtract ( 41 )   HTML ( 1)   PDF (1332KB) ( 302 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Virtual space teleconferencing is a novel CSCW tool that has abroad application perspective.There is no efficient communication mechanism to realize virtual space teleconferencing on Internet because most of end hosts in today's Internet have limited access bandwidth and the Internet does not support IP multicast.Adopting mesh-first and centralized strategies,a multi-source application level multicast method ESMVST for awareness driven virtual space teleconferencing on Internet was devised.The research focused on ESMVST method's application level multicast routing model VSTMMR and proposed a heuristic routing algorithm MDMM.The result of experiment shows that MDMM algorithm could reduce both algorithm's rejection rate and data distribution trees' maximal delay effectively,and ESMVST method is feasible.

    Construction of LDPC codes for higher burst-error detecting
    Chun-guang YAO,Xin GE,Ying-nan LIU,Jian ZHANG
    2007, 28(11):  108-112.  doi:1000-436X(2007)11-0111-05
    Asbtract ( 55 )   HTML ( 1)   PDF (1337KB) ( 550 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The coding of LDPC codes is focused on several aspects:high error-correction,low coding complexity and so on.All the construction methods do not give much consideration on hamming-distance and its distribution because of computation complexity.A suboptimal scheme which is with emphasis on hamming-distance and its distribution was presented.The codes introduced from this scheme can detect all burst-errors within the length of check matrix's rank and has no loss in performance of random-error-correction.

    Summarize
    Development and status of vehicular ad hoc networks
    Cu-yu CHANG,Yong XIANG,Mei-lin SHI
    2007, 28(11):  113-123.  doi:1000-436X(2007)11-0116-11
    Asbtract ( 335 )   HTML ( 44)   PDF (1367KB) ( 2608 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Historical development,characteristics and application fields of vehicular ad hoc networks (VANET) were introduced briefly.The advantages and disadvantages were discussed with analysis and comparison if various classes of MAC and routing protocol were applied to VANET.According to the characteristics of VANET,the ideas and breakthrough direction of inter-vehicle communication design of VANET were proposed.The active research institute and their main works about VANET were introduced to convenient the reader for tracking advanced research achievement at abroad.

    Passages
    Multiple access based on three-stage modulation in multi-band OFDM-UWB system
    Zhi-hua BAO,Shi-bing ZHANG,Guo-an ZHANG,Jin-jing QIN
    2007, 28(11):  124-131.  doi:1000-436X(2007)11-0127-07
    Asbtract ( 39 )   HTML ( 1)   PDF (1559KB) ( 216 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the characteristics of multi-band orthogonal frequency-division multiplexing ultra-wideband (OFDM-UWB) system,a multiple access based on three-stage modulation (TSM-MA) was proposed.It combined multi-carrier code division multiple access (MC-CDMA) with orthogonal frequency division multiple access (OFDMA) and frequency hopping multiple access (FHMA),carried out the advantages of the three multiple access techniques.It reduced the multiple access interference and made full use of the available resource of the channel.The two-stage spread spectrum and two-stage frequency hopping were used to the TSM-MA for reducing the complexity of receiver.Simulation results showed that TSM-MA has obvious advantages in bit error rate (BER) performance over time frequency code multiple access (TF-MA) about 3 dB and lower complexity than that of TF-MA.

    Research of ASP service compination model based on workflow
    Xiao-dong WU,Jia-jun BU,Chun CHEN
    2007, 28(11):  132-138.  doi:1000-436X(2007)11-0134-07
    Asbtract ( 45 )   HTML ( 2)   PDF (1041KB) ( 219 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A method of ASP service integration based on Workflow and data pump technology was proposed,the method applied workflow technology to realize procedure integratation of ASP serveice,and data pump technology to realize the integration of data.The key of ASP service integration was the control flow with the data stream,the control flow used the workflow technology,but the data stream performance data pump.In the ASP combination model realization technology based on workflow it discussed the thought of ASPWF model,with the establishment steps and designed the engine algorithm.It analyzed the SLA flow processing case of telecommunication enterprise operation in example,explained how to unifie the superiorities of workflow and the small granularity ASP combination service model,in order to enhance the whole system efficiency.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: