Please wait a minute...

Current Issue

    25 July 2016, Volume 37 Issue 7
    Key technologies for next generation mobile communications and networks
    Reviews of D2D technology for 5G communication networks
    Zhi-hong QIAN,Xue WANG
    2016, 37(7):  1-14.  doi:10.11959/j.issn.1000-436x.2016129
    Asbtract ( 2277 )   HTML ( 185)   PDF (973KB) ( 7139 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the basis of exploring D2D's leading role to developing trend of communication technologies in the future, some issues in terms of D2D system design are illustrated, like D2D device discovery, resource allocation, caching tech-nology and D2D-MIMO. Thereupon, the outline of separate data/control flattening 5G framework based on D2D is drawn, on the basis of optical fiber fronthaul and software defined network techniques. The mechanism, the lower macro/small base stations for access whereas the upper network cloud for management, is proposed. What emerges is that still major issues shall be faced by the research community, as D2D, SDN, edge computing and IOT technologies are expected to be introduced into the future mobile communication networks. The most relevant techniques for the future large-scale net-works, such as mobility, QoS and big data behavior, are addressed in details.

    Survey of several key technologies for 5G
    Ping ZHANG,Yun-zheng TAO,Zhi ZHANG
    2016, 37(7):  15-29.  doi:10.11959/j.issn.1000-436x.2016130
    Asbtract ( 3150 )   HTML ( 487)   PDF (1490KB) ( 5046 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The fifth-generation (5G) mobile communications system has got extensive attention and research by enter-prises, research institutes and universities of the world at present. The development history and domestic and abroad re-search progresses of 5G were described and summarized in detail. 5G network architecture based on virtualization were analyzed. From wireless transmission, wireless access and network perspectives, the potential key technologies of 5G, in-cluding massive MIMO, full-duplex, channel modeling, channel coding, etc. and their latest progress are introduced comprehensively and thoroughly. Some advantages, disadvantages and future research directions of some key technolo-gies are analyzed. At last, key tasks and main directions of the future development of 5G are prospected.

    Self-organizing techniques in ultra-dense wireless network
    Jian-dong LI,Wei TENG,Min SHENG,Chao XU
    2016, 37(7):  30-37.  doi:10.11959/j.issn.1000-436x.2016131
    Asbtract ( 533 )   HTML ( 8)   PDF (735KB) ( 648 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network densification was one of the main ways to deal with the challenge of supporting 1 000 times higher capacity in 5G networks. Wherein, a single node needs to configure and optimize more than 2 000 parameters. Therefore, novel self-organizing network (SON) would be the inevitable technique for wireless networking, where decision makers were enabled with the ability of perceiving the dynamic network situation and meanwhile, autonomously discovering as well as configuring network resources. With the aid of this promising technique, users' demands and network resources could be well matched and furthermore, the capacity of networks could be significantly improved. The trend of dense development in wireless communications was discussed. Then, the potential challenges and required new properties was analyzed when util-izing SON in ultra-dense wireless networks. Meanwhile, two typical use cases were depicted. Finally, for future ultra-densely deployed wireless networks, the possible development prospect and direction of SON were briefly presented.

    Study on network reconfiguration algorithms in software-defined sensor networks
    Lian-feng SHEN,Ya-ping ZHU,Zhao-ming DING,Feng YAN,Shu-guang DENG
    2016, 37(7):  38-49.  doi:10.11959/j.issn.1000-436x.2016132
    Asbtract ( 508 )   HTML ( 8)   PDF (858KB) ( 787 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the performances and adaptabilities of wireless sensor networks the architecture of soft-ware-defined sensor network (SDSN) was proposed and the studies were focused on the network reconfiguration algo-rithm of SDSN. In the algorithm, the theory of Voronoi diagram was first used to search the optimal allocation of sensing radius to achieve K-coverage on the target region. Then, based on the theory of simplicial complex, a centralized control mechanism based on the minimal generator of boundary chain group and the node degree was proposed to simplify the architecture of network topology and to ensure the connectivity of the whole system and the robustness of the emergency region. Considering the adaptability in dynamic environment of routing protocols in SDSN, a routing optimization algo-rithm for SDSN was proposed, which was based on quality of service (QoS) of multi-service. Simulation results show that the proposed routing algorithm can efficiently allocate resources to satisfy the requirements of multi-service's QoS and to prolong the lifetime of network.

    Development and outlook of deep space communication network protocol
    Jian-ping AN,Song JIN,Jun XU,Yu ZHANG,Li-wei SHAO
    2016, 37(7):  50-61.  doi:10.11959/j.issn.1000-436x.2016133
    Asbtract ( 713 )   HTML ( 35)   PDF (2424KB) ( 1792 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The demand of developing deep space communication network was analyzed. Combining the characteristics of the deep space communication network, the deep space communication network architecture and transport protocols were summarized. Through introducing some key technology of the deep space communication network, the development di-rection of future deep space communication network is put forward and bright prospects are shown.

    LTE D2D based vehicle networking communication architecture and data distributing strategy
    Jun PENG,Dong MA,Kai-yang LIU,Qian-qian ZHANG,Xiao-yong ZHANG
    2016, 37(7):  62-70.  doi:10.11959/j.issn.1000-436x.2016134
    Asbtract ( 906 )   HTML ( 33)   PDF (1062KB) ( 1283 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    5G based vehicle networks face with the requirements of high data rate, low latency, high reliability and mas-sive multimedia streaming distribution. A LTE D2D was proposed based vehicle networks communication architecture and then a movement consistency based vehicle clustering algorithm was designed. The results show it increases sus-tained D2D communication time and improves the reliability of D2D communication. Besides, a D2D cooperative relay-ing forward strategy under the constraint of latency for distributing multimedia streaming were proposed, which resulted in significant improvement of data transmission rate and network throughput.

    Academic paper
    Integral attack on HIGHT block cipher
    Jian-sheng GUO,Jing-yi CUI,Zhi-shu PAN,Yi-peng LIU
    2016, 37(7):  71-78.  doi:10.11959/j.issn.1000-436x.2016135
    Asbtract ( 449 )   HTML ( 12)   PDF (592KB) ( 657 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The security of HIGHT block cipher under integral attack was studied. Firstly, the flaw in the existing results on building the distinguisher was corrected. And a new 11-round integral distinguisher of HIGHT was built. Based on this new distinguisher, a 17-round multiple-integral distinguisher was built. By using the 17-round distinguisher, 25-round in-tegral attack on HIGHT was proposed based on the principle of time memory trade-off, with the data, time and memory complexity of 262.92, 266.20and 2119respectively. The results show that the attack was better than results before on the number of round and time complexity.

    MQHOA algorithm with energy level stabilizing process
    Peng WANG,Yan HUANG
    2016, 37(7):  79-86.  doi:10.11959/j.issn.1000-436x.2016136
    Asbtract ( 532 )   HTML ( 4)   PDF (683KB) ( 866 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An improved multi-scale quantum harmonic oscillator algorithm (MQHOA) with energy level stabilizing process was proposed analogizing to quantum harmonic oscillator's wave function. Inspired by quantum model, the op-timization problem was transformed to finding ground state wave function of bound state. Harmonic oscillator potential well was used to approach objective function under the condition of Taylor approximation. Energy level stabilization, en-ergy level reduction, scale reduction were the basic iterative convergence processes of MQHOA, coinciding with its physical model. Only one subjective control parameter was needed in MQHOA whose wave function and zero-point en-ergy were defined with reference to quantum model. Experimental results show that MQHOA's performance is superior to several other common optimization algorithms. For high dimensional testing functions including Ackley、Griewank、Sphere、Sum Squares、Zakharov, etc, the global optimums can be obtained precisely with 100% probability.

    Design and implementation algorithm of safe driver assistant system based on EOG
    Zhao LYU,Xiao-pei WU,Chao ZHANG,Bing WEI
    2016, 37(7):  87-95.  doi:10.11959/j.issn.1000-436x.2016111
    Asbtract ( 444 )   HTML ( 9)   PDF (740KB) ( 627 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to ensure driving safety, improve the intelligent level of the vehicle control system and realize“keeping hands on the wheel”, a safe driver assistant system (SDAS) based on EOG was proposed. The proposed sys-tem utilized saccade signals which come from bio-electrodes installed around driver's eyes, to generate some control commands when the driver observes different signs located on the head up display (HUD). Furthermore, independent component analysis (ICA) algorithm was used to extract spatial feature parameters of activity-detected EOG signals, and combined with support vector machine (SVM) method to recognize the type of saccade signals, such as up-rolling, left-rolling and right-rolling. Experiments have been carried out in lab environment, and the average correct ratio on 15 sub-jects is 98.43% and 96.0% corresponding to fatigue condition and non-fatigue condition respectively. Experiential results re-veal that the SDAS based on the multi-class saccade signals recognition algorithm presents an excellent classification per-formance.

    Requirements-driven and multi-homed-based multipath TCP congestion control algorithm for vehicular network
    Nan DING,Tao LIN,Cai-xia SONG,Guo-zhen TAN
    2016, 37(7):  96-106.  doi:10.11959/j.issn.1000-436x.2016137
    Asbtract ( 526 )   HTML ( 5)   PDF (1014KB) ( 796 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To meet the diversified QoS applications demanded by terminal units of a VANET, especially to ensure the timeliness and reliability when sending the high-priority messages that were related to safety-critical applications, a de-mand-driven MPTCP congestion control algorithm: PTLIA was proposed, which was based on message priority and throughput estimation. First, message priority and throughput proportion factor were defined to characterize the weight of each message being sent. Second, the patch estimation model was used to make real-time estimation of the state of each MPTCP path. Finally, the algorithm of PTLIA was accordingly designed to adjust, dynamically, the window of the con-gestion time on demand. The algorithm of PTLIA, as proved in proposed simulations and experiments, has shortened the transmission of the high-priority data, under the premise of MPTCP transmission principles.

    Convolutive blind separation algorithm based on complex Givens matrix and bat optimization
    Zhi-cheng JIA,Da-wei HAN,Lei CHEN,Yan-ju GUO,Hao-da XU
    2016, 37(7):  107-117.  doi:10.11959/j.issn.1000-436x.2016138
    Asbtract ( 318 )   HTML ( 0)   PDF (1696KB) ( 489 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the limitations such as many unknown parameters, the separation accuracy was easily influenced by initial value of separation matrix in traditional convolutive blind separation, a kind of frequency method based on complex Givens matrix and bat optimization was proposed. The algorithm used a series of complex Givens matrices to denote separation matrix, it reduced unknown parameters, decreased the difficulty and the amount of calculations as a result. Be-sides, the algorithm utilized bat algorithm instead of conventional gradient algorithm to optimize rotation angles and completed the separation of complex linear instantaneous mixing signals at each frequency point, the use of bat algorithm made the optimization ability better. In addition, little prior information was needed and signals following various distri-butions could be separated. Simulation results show that the proposed method can realize convolutive blind separation ef-ficiently.

    Directional evidence conflict measurement approach
    Lu WANG,Qing-hua XING,Yi-fan MAO
    2016, 37(7):  118-123.  doi:10.11959/j.issn.1000-436x.2016143
    Asbtract ( 277 )   HTML ( 1)   PDF (339KB) ( 387 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that traditional evidence conflict measurement approaches can not express the differ-ence of mutual support degrees between evidences, a directional evidence conflict measurement approach was proposed. The conflict degree of evidences could be measured based on the new defined directional support degree, which imported the support coefficient to make the model dissymmetrical. Simulation results show that the proposed method can not only express the difference of mutual support degrees between evidences, but also solves the problem that traditional ap-proaches work poorly under special situation.

    Power allocation algorithms in two-hop relaying networks based on optimal energy efficiency
    Bao-feng JI,Jia YANG,Yi-dan WANG,Ying HU,Chun-guo LI,Liang SONG
    2016, 37(7):  124-131.  doi:10.11959/j.issn.1000-436x.2016140
    Asbtract ( 367 )   HTML ( 1)   PDF (610KB) ( 479 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The joint source-relay power allocation issue in green dual-hop single antenna relaying systems was investi-gated from the energy efficiency point of view. By considering a practical power consumption model, the optimal algo-rithm in order to satisfy the constraints of system quality of service was proposed. The non-convex problem was con-verted into the convex problem through high power approximation and then the highly complicated optimization problem was solved by deliberately manipulating the Lagrangian function using the properties of the Lambert function. The opti-mal transmit power of the source and that of the relay are derived in the form of analytical expressions based on the maximization of EE with a guarantee of the required spectral efficiency(SE).It is shown that the optimal relay-to-source power ratio is adaptive to the ratio of the instantaneous two-hop channel gains. Numerical simulations have illustrated the effectiveness of proposed scheme.

    Secure OFDM transmission scheme based on two-stage chaos mapping
    Ying WANG,Xiao-zhong ZHANG,Juan ZENG,Yong-ming WANG
    2016, 37(7):  132-139.  doi:10.11959/j.issn.1000-436x.2016141
    Asbtract ( 367 )   HTML ( 4)   PDF (959KB) ( 632 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A secure OFDM transmission scheme based on two-stage chaos mapping was introduced, which were cha-oticphase rotation and sub-carrier chaos mapping. The characteristics of pseudo-random and sensitivity to initial condi-tions of chaos sequences were employed. Numerical results and analysis show that the scheme canensure secure informa-tion transmission,and improve the pseudo-randomness of transmitted signals. The eavesdropper cannot estimate the mes-sage from statistic characteristics of received signals, which guarantees the communication security. Compared with tra-ditional methods like advanced encryption standard, randomization of MIMO transmission coefficients, the scheme shows favorable computation security.

    Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries
    Hai LIU,Xing-hua LI,Er-meng WANG,Jian-feng MA
    2016, 37(7):  140-150.  doi:10.11959/j.issn.1000-436x.2016142
    Asbtract ( 353 )   HTML ( 3)   PDF (1031KB) ( 944 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Without need for the third party and sharing key, the dummy-based privacy protection scheme enabled users to obtain the precise query result in location-based services. However, in continuous queries, since the existing dummy-based privacy protection schemes ignored the spatio-temporal relevance of the submitted neighbor location sets, the ad-versary could infer dummies, making that the protection degree of users' location privacy was reduced. To solve this problem, a dummy-based privacy protection enhancing method toward continuous queries was proposed. In the proposal, the candidate dummies were first generated by the existing dummy-based schemes, and could be filtered through the check of continuous reasonability and single privacy enhancement. Security analysis shows that, in the proposed method, the formed movement paths are indistinguishable in time and space, so that protecting the user's location privacy effectively in continuous queries. Moreover, extensive experiments indicate that its computation cost is limited, and compared with the scheme adopted to generate candidate dummies, the user's privacy protection is also enhanced in snapshot query.

    Dynamic fair allocation of multi-resources based on shared resource quantity
    Xiao-lu ZHANG,Xi LIU,Wei-dong LI,Xue-jie ZHANG
    2016, 37(7):  151-160.  doi:10.11959/j.issn.1000-436x.2016144
    Asbtract ( 438 )   HTML ( 23)   PDF (925KB) ( 1723 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A dynamic fair allocation of multi-resources was proposed based on shared resource quantity for multi-resoures allocation problem in cloud shared computing system. Firstly, a linear programming model was given based on resource requirements and quantity of shared resource and this model was further proved which satisfies four fairness properties such as DPO, SI, DEF and SP. Secondly, an improved dynamic multi-resources fair allocation algo-rithm was introduced for the allocation efficiency. Finally, theoretical analysis and experiments demonstrate that this strategy can satisfy the demands as well as maximize the dominant share on the base of approaching fairness and the im-proved algorithm increases the allocation efficiency in the dynamic system.

    Academic communication
    Hierarchical certificateless authenticated key agreement protocol
    Hang SU,Jian-wei LIU,Rui TAO
    2016, 37(7):  161-171.  doi:10.11959/j.issn.1000-436x.2016145
    Asbtract ( 351 )   HTML ( 14)   PDF (420KB) ( 587 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption. In the protocol, a root PKG authenticates the identity and generates a partial private key for lower-level PKG which authenticate the identity and generate a partial private key for users, private key generated by partial private key and user selected secret value. Comparing with the existing protocols, the protocol is efficient without bilinear pairings computation.

    Study on energy saving strategy and Nash equilibrium of base station in cognitive radio network
    Xiao-tong MA,Shun-fu JIN,Jian-ping LIU,Zhan-qiang HUO
    2016, 37(7):  172-181.  doi:10.11959/j.issn.1000-436x.2016146
    Asbtract ( 357 )   HTML ( 7)   PDF (772KB) ( 782 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Spectrum utilization can be improved in cognitive radio network (CRN), however, the problem of increasing communication energy consumption was also brought. Under the premise of ensuring the experience quality of system users, the concept of green communication in CRN was introduced, and a novel energy saving strategy for base station was proposed. Accordingly, a two-dimensional discrete time Markov stochastic model with preemptive priority service and single working vacation was established. Using the method of a matrix geometric solution, the system performance of the energy saving strategy was evaluated in terms of energy saving rate, channel utilization, average delay of secon-dary users and interruption of secondary users. The theoretical analysis results and the simulation results verify the effec-tiveness of the energy saving strategy. From the perspective of economics, a profit function was constructed and a nonlinear optimization algorithm was designed to investigate the Nash equilibrium and the socially optimal behavior of the secondary user packets, then a pricing policy of licensed spectrum for secondary users was formulated. In view of different system parameters, the system experiment was carried out to validate the rationality of the pricing policy.

    Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network
    Dan LIU,Run-hua SHI,Shun ZHANG,Hong ZHONG
    2016, 37(7):  182-192.  doi:10.11959/j.issn.1000-436x.2016147
    Asbtract ( 502 )   HTML ( 9)   PDF (1579KB) ( 576 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the privacy-preserving problem during the roaming authentication of wireless mobile networks, a novel roaming authentication scheme with anonymity was presented. An efficient certificateless aggregate signature scheme was first constructed, by introducing the online/offline signature and combining the aggregate signature. Com-pared with the related schemes, the proposed scheme has higher efficiency in computations of both signature and verifi-cation, and also improves the efficiency in communications. Furthermore, based on the proposed signature scheme, a novel roaming authentication scheme with anonymity was presented, in which it simplified the traditional three-party au-thentication model. The theoretical analysis shows that this scheme is secure and effective, and thus it is especially suit-able for large-scale wireless mobile networks.

    Neural network blind equalization optimized by parallel genetic algorithm with partial elitist strategy
    Er-fu WANG,Yuan-shuo ZHENG,Xin-wu CHEN
    2016, 37(7):  193-200.  doi:10.11959/j.issn.1000-436x.2016148
    Asbtract ( 442 )   HTML ( 3)   PDF (386KB) ( 309 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Owing to the disadvantage of slow convergence and easy to fall into local minimum of the neural network blind equalization algorithm under high dimensional and non-convex cost function, a parallel genetic algorithm (GA) with partial elitist strategy was proposed to optimize neural network training. According to the neural network topology, individual coding, the control code and the weights were set up to realize the network topology structure and the network weights simultaneously. The individual group was sorted according to the adaptation degree of the optimization iterative process, in order to integrate the advantages of genetic algorithm under the conditions of different genetic operators. Some elite strategies effectively avoid the phenomenon of premature phenomena caused by the optimal individual control in the process of evolution. The simulation results under the nonlinear channel condition show that the method has better convergence performance.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: