Please wait a minute...

Current Issue

    25 October 2016, Volume 37 Issue Z1
    Contents Papers
    Research onconvolutional neural network for reservoir parameter prediction
    You-xiang DUAN,Gen-tian LI,Qi-feng SUN
    2016, 37(Z1):  1-9.  doi:10.11959/j.issn.1000-436x.2016240
    Asbtract ( 758 )   HTML ( 21)   PDF (4974KB) ( 1625 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the branch of artificial intelligence,artificial neural network solved many difficult practical problems in pattern recognition and classification prediction field successfully.However,they cannot learn the feature from networks.In recent years,deep learning becomes more and more advanced,but the research on the field of geological reservoir pa-rameter prediction is still rare.A method to predict reservoir parameters by convolutional neural network was presented,which can not only predict reservoir parameters accurately,but also get features of the geological reservoir.The study es-tablished the convolutional neural network model.Results show that the convolutional neural network can be used for reservoir parameter prediction,and get high prediction precision.Moreover,convolutional features from convolutional neural network provided important support for geological modeling and logging interpretation.

    Method to create and optimize original electric power communication network based on K-means
    Xin JIN,Liang YANG,Cheng-ming JIN,Guo-hua SU,Lei SUN
    2016, 37(Z1):  10-14.  doi:10.11959/j.issn.1000-436x.2016241
    Asbtract ( 352 )   HTML ( 6)   PDF (529KB) ( 469 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The major contribution was using the K-means to create nodes instead of traditional Waxman means in order to get a suitable and strong original electric power communication network.After the nodes were created,a vulnerability analysis was given on the grid of the network topology and check that if it has a network islanding,at last the weak nodes would be reinforced.A simulation about this algorithm shows that this algorithm which combines K-means and vulner-ability can create a electric power communication networks with better resistance of risks.

    Model of three-way decision based on the space of set pair information granule and its application
    Chun-ying ZHANG,Li-ya WANG,Ming-xia LI,Bao-xiang LIU
    2016, 37(Z1):  15-24.  doi:10.11959/j.issn.1000-436x.2016242
    Asbtract ( 454 )   HTML ( 16)   PDF (1496KB) ( 486 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Through the analysis of the existing theory and method of three-way decision,model of three-way decision based on the space of set pair information granule was proposed,which was to explain the intension and extension of three-way decision on the view of unity of opposites.Firstly the space structure of set pair information granule can be di-vided into positive granule,negative granule,different granule,which were similar and slightly different with three re-gions of generalized three-way decision.The three kinds of information granules in set pair information granule space were built based on certain positive degree,negative degree and different degree.Secondly,according to the given threshold,set pair information granule is divided into mutually disjointing positive region,negative region and different region.Based on these three regions,the computing method of decision loss function is put forward,and the process of decision-making algorithm is obtained use the three-way decision method of set pair information granule space to evalu-ate and make decision on risk investment,then good decision results have been achieved.

    Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
    Chun-jie CAO,Jing-zhang SUN,Zhi-qiang ZHANG,Long-juan WANG,Meng-xing HUANG
    2016, 37(Z1):  25-29.  doi:10.11959/j.issn.1000-436x.2016243
    Asbtract ( 428 )   HTML ( 3)   PDF (1098KB) ( 613 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.

    Rough decision rules extraction and reduction based on granular computing
    Hong-can YAN,Feng ZHANG,Bao-xiang LIU
    2016, 37(Z1):  30-35.  doi:10.11959/j.issn.1000-436x.2016244
    Asbtract ( 325 )   HTML ( 2)   PDF (653KB) ( 506 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rule mining was an important research content of data mining,and it was also a hot research topic in the fields of decision support system,artificial intelligence,recommendation system,etc,where attribute reduction and minimal rule set extraction were the key links.Most importantly,the efficiency of extraction was determined by its application.The rough set model and granular computing theory were applied to the decision rule reduction.The decision table was granulated by granulation function,the grain of membership and the concept granular set construction algorithm gener-ated the initial concept granular set.Therefore,attribute reduction could be realized by the distinguish operator of concept granule,and decision rules extraction could be achieved by visualization of concept granule lattice.Experimental result shows that the method is easier to be applied to computer programming and it is more efficient and practical than the existing methods.

    Power short-term load forecasting based on big data and optimization neural network
    Xin JIN,Long-wei LI,Jia-nan JI,Zhi-qi LI,Yu HU,Yong-bin ZHAO
    2016, 37(Z1):  36-42.  doi:10.11959/j.issn.1000-436x.2016245
    Asbtract ( 1231 )   HTML ( 16)   PDF (596KB) ( 1928 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the reduction of the cost of power data acquisition and the interconnection of large scale power systems,the types of data available in the power network are becoming more and more abundant.In the past,the centralized fore-casting method was limited to the analysis of the massive power data.Therefore,a short-term power load forecasting based on large data and particle swarm optimization BP neural network was proposed,and short-term power load fore-casting model was established.The actual load data of the national grid,using the method of prediction,compared with the actual load data and centralized load forecasting results prove that this method is accurate enough,reduce the load forecasting time with feasibility in practical application.

    Design and implementation of the motion control system of the mobile robot based on PID
    Xiao-ping DU,Kai-qi ZHAO
    2016, 37(Z1):  43-49.  doi:10.11959/j.issn.1000-436x.2016246
    Asbtract ( 571 )   HTML ( 24)   PDF (762KB) ( 2247 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A kind of motion control system of the autonomous mobile robot was introduced,and a PID closed-loop control method was proposed that controlling the robot moving along the expected direction and speed effectively through establishing the kinematics model of the autonomous mobile robot.In addition,the modular software program and the hardware system were developed whose main components were the STC12C5A60S2 microprocessor,the MC33886 motor driver chip and hall sensors.Finally,experiments proves the control method and the system effective and stable.

    Wi-Fi security evaluation model based on BP neural network
    Hai-yan KANG,Han YAN,Hao-ran HUANG,Xuan1 SUN
    2016, 37(Z1):  50-56.  doi:10.11959/j.issn.1000-436x.2016247
    Asbtract ( 368 )   HTML ( 6)   PDF (587KB) ( 833 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A Wi-Fi security evaluation model was proposed based on BP neural network.Firstly a large number of Wi-Fi hotspots was analyzed,safety information sources about wireless hotspots were selected.Secondly,a model of BP neural network was constructed,the weights were adjusted,and the evaluation system for Wi-Fi safety was formed,which was higher credibility.Finally,on the Android flatform the application based on above theory was designed.A lot of experi-ments show the model is able to scan and evaluate the wireless hotspot around user.It can also provide the disconnect function on unsafe wireless hotspot.

    Mutual information power analysis attack of HMAC based on SM3
    Zhen WU,Min WANG,Jin-tao RAO,Zhi-bo DU,Sheng WANG,Ling-hao ZHANG
    2016, 37(Z1):  57-62.  doi:10.11959/j.issn.1000-436x.2016248
    Asbtract ( 480 )   HTML ( 10)   PDF (883KB) ( 519 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel method of mutual information power analysis attack was proposed.The method was built on the basis of the basic principle of power analysis and the basic theory of information.For the purpose of attacking the key,the mutual in-formation values was computed using two values between the mediate variable with the power traces.An experiment was im-plemented on the algorithm of HMAC based on SM3 using this method.The experimental results show the proposed attack method is effective because the initial value of state variable can be successfully retrieved to compute the real true key.

    Conditional privacy-protection remote user authentication mechanism for WBAN
    Jin CAO,Yi-qing ZHENG,Hui LI
    2016, 37(Z1):  63-71.  doi:10.11959/j.issn.1000-436x.2016249
    Asbtract ( 456 )   HTML ( 7)   PDF (887KB) ( 619 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A conditional privacy-protection remote user authentication scheme based on a certificateless group signature was proposed,which can accomplish the anonymous mutual authentication between the user and the remote doctors.In addition,when the doctors perceived that users were in case of an emergency,the mechanism enabled the only group manager (GM) to expose the real identity information of users and given users timely assistance.The scheme can provide the anonymity,traceability,mutual authentication,non-reputation and some other security features.The performance analysis results show the scheme is more suitable for WBAN.

    Research on optimization of repeater distribution based on cellular communication system
    Shao-hong YAN,Yu-hang WU,Dian-xuan GONG
    2016, 37(Z1):  72-77.  doi:10.11959/j.issn.1000-436x.2016250
    Asbtract ( 474 )   HTML ( 14)   PDF (1002KB) ( 719 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    First considering the signal in space link loss,in combination with lowest relay protection field intensity,power and the reasonable analysis and determination of parameters such as system allowance,a repeater Egli model was adopted to cover radius expression was drew.Secondly on the repeater distribution location,center incentive model of cellular communication system was improved to the center-vertex incentive model.The model area of coverage can be increased by 4%,the user coverage increased by 22%.The repeater distribution in communication system provides a good optimization.

    Multi-point joint power analysis attack against AES
    Zhi-bo DU,UNYuan-hua S,ANGYi W
    2016, 37(Z1):  78-84.  doi:10.11959/j.issn.1000-436x.2016251
    Asbtract ( 477 )   HTML ( 13)   PDF (1722KB) ( 1000 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as required more power traces,the low utilization rate of information and so on.A novel method of muti-point joint power analysis attack against AES was proposed to solve the problems.And taking the correlation power analysis attack as an example,the detailed attack process was presented.The operations of the round key addition and the SubBytes were chosen as the attack intermediate variable at the same time.Then the joint power leakage function was con-structed for the attack intermediate variable.And the multi-point joint correlation energy analysis attack was given.Aiming at the AES cryptographic algorithm implemented on the smart card,the multi-point joint power analysis attack,the correlation power analysis attack with the single information leakage point in the key addition and the SubBytes were conducted.The measured results validate the proposed method is effective.It also shows that the proposed method has the advantages of high success rate and less power traces comparing with the single information leakage point.

    Method for generating pseudo random numbers based on cellular neural network
    Li-hua DONG,Guo-li YAO
    2016, 37(Z1):  85-91.  doi:10.11959/j.issn.1000-436x.2016252
    Asbtract ( 431 )   HTML ( 6)   PDF (2992KB) ( 763 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.

    Research on multi-channel routing threats and defense for cognitive ad hoc network
    Jing-yu FENG,Xu DU,Hong-gang WANG,Wen-hua HUANG
    2016, 37(Z1):  92-97.  doi:10.11959/j.issn.1000-436x.2016253
    Asbtract ( 290 )   HTML ( 6)   PDF (352KB) ( 498 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the environment of scarce spectrum resources,cognitive ad hoc network which is independent with infrastruc-ture and fixed spectrum allocation policy,has been also developed quickly.Due to the characteristic of multi-channel routing,cognitive ad hoc network is commonly perceived as an environment offering both opportunities and threats.To further un-derstand the multi-channel routing threats,the current research situation and development trend,the types of threats were analyzed in terms of the node routing and the multi-channel selection,and several typical security methods were concluded.Meanwhile,the most important solution to keep the security of cognitive radio network was found to build trust relationship among cognitive users.Trust management was just the basic technology to solve the security problems of multi-channel routing.Finally,the current problems of related works and research trends in this area were discussed.

    Round reduction-based fault attack on SM4 algorithm
    Min WANG,Zhen WU,Jin-tao RAO,Hang LING
    2016, 37(Z1):  98-103.  doi:10.11959/j.issn.1000-436x.2016254
    Asbtract ( 513 )   HTML ( 18)   PDF (883KB) ( 943 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel method of fault attack based on round reduction against SM4 algorithm was proposed.Faults were in-jected into the last four rounds of the SM4 encryption algorithm,so that the number of the algorithm's rounds can be re-duced.In known-ciphertext scenario,four traces are enough to recover the total 128 bit master key by screening these faults easily.The proposed attack is made to an unprotected SM4 smart card.Experiment shows that this attack method is efficient,and which not only simplifies the existing differential fault attack,but also improves the feasibility of the attack.

    Differential fault attack on lightweight block cipher Klein
    Yong-juan WANG,Quan-yu2 REN,Shi-yi ZHANG
    2016, 37(Z1):  111-115.  doi:0.11959/j.issn.1000-436x.2016256
    Asbtract ( 198 )   HTML ( 10)   PDF (396KB) ( 720 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a lightweight block cipher algorithm based on SP structure,Klien has the characteristics of high efficiency and low energy consumption.By analyzing the S-boxes differential propagation path,it was found that under the condi-tion of same input and different difference,the intersection elements were unique,which fall in the intermediate state set corresponds to output difference,and a differential fault attack scheme was proposed.By injecting two different faults in the last round of the algorithm,all the keys of the Klein algorithm can be recovered,and the complexity is negligible.This method can be promoted to other block cipher algorithms based on SP structure and Feistel structure.

    Phishing attacks discovery based on HTML layout similarity
    Xue-qiang ZOU,Peng ZHANG,Cai-yun HUANG,Zhi-peng CHEN,Yong SUN,Qing-yun LIU
    2016, 37(Z1):  116-124.  doi:10.11959/j.issn.1000-436x.2016257
    Asbtract ( 470 )   HTML ( 13)   PDF (714KB) ( 881 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.

    RLWE-based key-policy ABE scheme
    Ze-dong SUN,Yue-fei ZHU,Chun-xiang GU,Yong-hui1 ZHENG
    2016, 37(Z1):  125-131.  doi:10.11959/j.issn.1000-436x.2016258
    Asbtract ( 506 )   HTML ( 8)   PDF (1346KB) ( 1188 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the attribute-based encryption(ABE) scheme which was proposed by Brakerski and constructed on the LWE problem,a RLWE-based key-policy ABE scheme was presented.Efficiency and key size of this scheme over-takes old ones which are based on the LWE problem.Under the RLWE assumption,this scheme supports attributes of unbounded length and semi-adaptive security.Moreover,a compiler was constructed and could compile ABE scheme that meets its demand into an attribute-based fully homomorphic encryption (ABFHE) scheme.

    Detection of image copy-move forgery using local intensity order pattern
    Jing LIN,Tian-qiang HUANG,Ling-peng LIN,Xiao-chen1 LI
    2016, 37(Z1):  132-139.  doi:10.11959/j.issn.1000-436x.2016259
    Asbtract ( 381 )   HTML ( 3)   PDF (2299KB) ( 619 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Copy-move forgery was one of the most simple and common way of image manipulations.To improve the ro-bustness of most existing copy-move forgery detections,a new method based on local intensity order pattern was pro-posed.First,the LIOP feature descriptors were exacted from the inspected image.Then the angular cosine of feature de-scriptors were used to measure the similarity,and the stable matching points were found according to the distance ratio threshold of the nearest neighbor point to the second nearest neighbor.Finally,the space distance of the matching points were calculated to remove the false matching points.Extensive experimental results were presented to confirm that the proposed method is not only able to effectively identify and locate the altered area,but also have high accuracy and ro-bust to scaling,rotation,brightness change and some post-processing,such as Gaussian blur,additive white Gaussian noise and JPEG compression.

    Lightweight integrity verification scheme for cloud based group data
    Yun-fei LIU,Yong-jun WANG,UShao-jing F
    2016, 37(Z1):  140-146.  doi:10.11959/j.issn.1000-436x.2016260
    Asbtract ( 281 )   HTML ( 3)   PDF (1029KB) ( 423 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.

    Construction mechanism for service path over reconfigurable service-centric network
    Dan ZHAO,Feng WEN,Xin XU,Peng WANG,Bo CHEN
    2016, 37(Z1):  147-155.  doi:10.11959/j.issn.1000-436x.2016261
    Asbtract ( 300 )   HTML ( 2)   PDF (1432KB) ( 527 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to enhance the flexible and intelligent network's service ability,a novel architecture called recon-figurable service-centric network (ReSCNet) was proposed which decomposed traditional network capabilities and ser-vices into fine-grained network functional unit.Then based on service routing matrix algorithm to orchestrate and deploy atomic service flexibly,a service path was built which possess smaller cost,lower time delay,higher degree of load bal-ance and higher reliability.Finally,the performance of service routing matrix algorithm was evaluated on the innovation experiment platform NetFPGA-10G.The simulation results show that the algorithm has a better performance and can cus-tomize an optimal service path for users while meet the specific functions and performance constraints.

    Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
    Cheng-cheng MAI,Bo CHEN,Jia-kun ZHOU,Ling YU
    2016, 37(Z1):  156-167.  doi:10.11959/j.issn.1000-436x.2016262
    Asbtract ( 335 )   HTML ( 7)   PDF (2274KB) ( 513 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.

    Security analysis and improvement of two attribute-based signature schemes
    Xiao YANG,Guang-li XIANG,Jiang-hong WEI,Rui-zong SUN
    2016, 37(Z1):  168-173.  doi:10.11959/j.issn.1000-436x.2016263
    Asbtract ( 335 )   HTML ( 9)   PDF (1188KB) ( 500 )   Knowledge map   
    References | Related Articles | Metrics

    In order to overcome the drawbacks of current attribute-based signature (ABS) schemes in terms of security,efficiency and signing policy,Ma,et al.and Cao,et al.respectively proposed a threshold ABS with single attribute au-thority and a multi-authority ABS with signing policy supporting AND,OR,threshold gates,and presented the security proof of their schemes under computational Diffie-Hellman assumption.Both schemes were demonstrated have security pitfalls by presenting specified attacks against them.Specifically,their schemes are all vulnerable to forgery attack.Thus,they are not feasible for practical applications.In addition,the cause of the flaws in these ABS schemes are presented,as well as an improvement of Ma et al.'s scheme.

    Anonymity handover authentication protocol based on group signature for wireless Mesh network
    Bin-ting SU,Li XU,Feng WANG,NZhi-xing LI
    2016, 37(Z1):  174-179.  doi:10.11959/j.issn.1000-436x.2016264
    Asbtract ( 374 )   HTML ( 2)   PDF (595KB) ( 459 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.

    Business process mining based insider threat detection system
    Tai-ming ZHU,Yuan-bo GUO,An-kang JU,Jun MA
    2016, 37(Z1):  180-188.  doi:10.11959/j.issn.1000-436x.2016265
    Asbtract ( 417 )   HTML ( 6)   PDF (700KB) ( 700 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.

    Correspondences
    Data leakage prevention system based on transparent encryption for mobile terminal equipment
    Zhen-tao HUANG,Nuan HE,An-min FU,Bo-yu KUANG,Guang-hua ZHANG
    2016, 37(Z1):  189-196.  doi:10.11959/j.issn.1000-436x.2016266
    Asbtract ( 479 )   HTML ( 3)   PDF (550KB) ( 951 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.

    Certificate integration management platform based on identity key
    Mu-zhou LIU,Jian-shu QIU,Yun-yong ZHANG,Bin-feng YAN,Si-yao ZHANG,Ya-fei TANG
    2016, 37(Z1):  197-203.  doi:10.11959/j.issn.1000-436x.2016267
    Asbtract ( 352 )   HTML ( 20)   PDF (375KB) ( 749 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system communication and storage cost.A management platform and its unique merits were introduced after analyzing the current security schemes and comparing their various advantages and defects.According to the analysis of technical principles and functions,this product has a promising future.

    Research on DDoS detection in multi-tenant cloud based on entropy change
    Miao WANG,Li-ming WANG,Zhen XU,Duo-he MA
    2016, 37(Z1):  204-210.  doi:10.11959/j.issn.1000-436x.2016268
    Asbtract ( 478 )   HTML ( 6)   PDF (2190KB) ( 490 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An attacker compromised a number of VMs in the cloud to form his own network to launch a powerful distrib-uted denial of service (DDoS) attack.DDoS attack is a serious threat to multi-tenant cloud.It is difficult to detect which VM in the cloud are compromised and what is the attack target,especially when the VM in the cloud is the victim.A DDoS detection method was presented suitable for multi-tenant cloud environment by identifying the malicious VM at-tack sources first and then the victims.A distributed detection framework was proposed.The distributed agent detects the suspicious VM which generate the potential DDoS attack traffic flows on the source side.A central server confirms the real attack flows.The feasibility and effectiveness of the proposed detection method are verified by experiments in the multi-tenant cloud environment.

    Joint sparse model based data reconstruction algorithm for wireless sensor network
    Yi-yin LIU,Guo-rui LI,Li TIAN
    2016, 37(Z1):  211-218.  doi:10.11959/j.issn.1000-436x.2016269
    Asbtract ( 477 )   HTML ( 1)   PDF (1598KB) ( 668 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The data of wireless sensor network has strong joint sparse characteristics,by utilizing compressed sensing theory,compressed data by joint encoding,and then reconstructed the data by joint decoding,the sensed data can be gathered with low computational cost.A synchronous subspace pursuit algorithm based on joint sparse model and com-pressed sensing theory was proposed.By utilizing the sparsity of the sensed data,it selected the correct joint subspace and reconstruct the original signal group accurately with fewer observations in a backtracking iterative manner.Com-pared with SCoSaMP algorithm and SP algorithm,the proposed algorithm presents better data reconstruction perform-ance under the conditions of different sparsity and sampling rate.

    Research on decision making of optimal communication system based on user
    Yu-hang WU,Shao-hong YAN
    2016, 37(Z1):  219-223.  doi:10.11959/j.issn.1000-436x.2016270
    Asbtract ( 266 )   HTML ( 1)   PDF (642KB) ( 386 )   Knowledge map   
    References | Related Articles | Metrics

    In order to study the problem of how to choose the wireless channel connection system to meet the needs of users in the wireless communication environment,according to the number of users using the Irish call loss,the estimated number of users need to meet the channel should be provided.Followed by the number of channels to establish the rela-tion model between user requirements and system capacity,introducing comprehensive evaluation factors to evaluate FDMA,TDMA and CDMA communication system.Finally a solution was put forward to meet the optimal decision the needs of users.This scheme not only realizes the effective utilization of the channel,and the channel has certain redun-dancy,avoid the system reconstruction caused by future user growth,capital waste,provides a measure of win-win choice for different number of users of the communication system.

    Location privacy preserving scheme against attack from friends in SNS
    Xi LIN,Yi-liang HAN,Yan KE,Xiao-yuan YANG
    2016, 37(Z1):  224-230.  doi:10.11959/j.issn.1000-436x.2016271
    Asbtract ( 299 )   HTML ( 3)   PDF (1037KB) ( 478 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: