Please wait a minute...

Current Issue

    25 June 2015, Volume 36 Issue 6
    Academic paper
    Fundamental performance bounds for multi-performance criteria in wireless ad hoc networks
    Qi WANG,Jaffrès-Runser Katia,Yi SUN,Jun LI,Jun ZHANG,Bin DA,Zhong-cheng LI
    2015, 36(6):  1-140.  doi:10.11959/j.issn.1000-436x.2015168
    Asbtract ( 322 )   HTML ( 8)   PDF (1760KB) ( 636 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In wireless ad hoc networks,the fundamental performance bounds could provide insight to improve network routing or resource allocation protocol as well as an upper bound against which to compare the performance of existing protocols.This work addresses the problem of deriving fundamental performance bounds including Pareto optimal upper and lower bounds for wireless ad hoc networks when multiple criteria including throughput,delay and energy are of interest.It is based on a performance evaluation framework composed of a broadcast and interference-limited network model.Fundamental performance bounds derived for a 1-relay and a 2-relay with multi-flow topologies are assessed through simulations.The model is validated with highest RMSE lower than 10-3.

    Time series data aggregation algorithm with synchronous prediction for WBAN
    Ru-yan WANG,Mei-ling ZHAI,Da-peng WU
    2015, 36(6):  13-21.  doi:10.11959/j.issn.1000-436x.2015147
    Asbtract ( 412 )   HTML ( 8)   PDF (513KB) ( 992 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the nonlinearity and nonstationarity of the physiological data sensed by WBAN,data aggregation cannot be effectively achieved according to the time-domain trend of data.Therefore,a novel time series data aggregation algorithm with synchronous prediction was proposed.By preprocessing the original sensing data with the multi-resolution analysis,the inherent characteristics of the physiological data can be obtained to establish a light-weight synchronous prediction model at both the sensor and sink.Numerical results show that the proposed aggregation algorithm can achieve a favorable prediction precision and a low energy consumption rate by eliminating the in-network data redundancy.

    Cooperative sensing method considering malicious nodes in cognitive radio networks
    Xiao-gang QI,Sheng-yu ZHENG,Li-fang LIU,Hui-fang WANG
    2015, 36(6):  22-30.  doi:10.11959/j.issn.1000-436x.2015119
    Asbtract ( 291 )   HTML ( 4)   PDF (1660KB) ( 673 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on a more practical cognitive radio network with malicious users,the spectrum sharing network model based on the cooperative spectrum sensing was studied that the secondary user can dynamically adjust its transmit power based on cooperative sensing results.To avoid significant reduction in performance of spectrum sensing system caused by malicious nodes,it is aimed to study how to improve the performance of cooperative sensing.By introducing the convex optimization problem,the secondary network throughput is maximized under the certain detection probability conditions and the corresponding power constraints.Simulation results show that whether or not there are malicious nodes,the algorithm is efficient in calculating optimal sensing time and the optimal transmit powers,and the secondary network throughput is increased when the maximum interference power limits and the maximum transmit power restrictions are decreased.

    Active measurement mechanism measuring SDN performances
    Ming CHEN,Fei DAI,Bo XU,Chang-you XING,Bing LI,Guo-min ZHANG
    2015, 36(6):  31-40.  doi:10.11959/j.issn.1000-436x.2015199
    Asbtract ( 395 )   HTML ( 4)   PDF (1125KB) ( 949 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An active SDN measurement mechanism was proposed,which could measure the end-to-end path performance between any two nodes,then the OpenFlow measurement protocol OFMP was designed,and a prototype OFMd was implemented,which could measure multiple performance metrics of the flow between two nodes without changing the switch forwarding rule.The experiment results show that OFMd can acquire multiple end to end path performance metrics only by sending a single probe packet.

    High-throughput and low-overhead probabilistic routing based on multi-player bargaining game for opportunistic networks
    Zhi REN,Jian-wei SUO,Wen-peng LIU,Hong-jiang LEI,Qian-bin CHEN
    2015, 36(6):  41-48.  doi:10.11959/j.issn.1000-436x.2015129
    Asbtract ( 326 )   HTML ( 2)   PDF (642KB) ( 690 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address the problems existing in the present probabilistic routing based on bargaining games,including unidirectional transmission of messages degrades the success ratio,depending on the virtual money decreases the purchasing power of nodes,and redundancy exists in the interaction process of messages,an routing algorithm based on multi-player bargaining game for opportunistic networks,HLPR-MG,was proposed.Through extending the two-player game to a multi-player bargaining game,introducing the barter trade to enhance purchasing power of nodes,and improving the existing interaction mechanism to reduce the times of game,proposed algorithm achieves the effect of increasing network throughput and decreasing control overhead.Theoretical analysis verifies the effectiveness of HLPR-MG,and simulation results show that HLPR-MG improves the network throughput and success ratio at least 3.63%,and reduces the control overhead and average end-to-end delay by more than 17.76% and 4.03%,respectively,as compared to the classical GSCP and BG algorithms.

    Web services QoS prediction via matrix completion with structural noise
    Lei CHEN,Geng YANG,Zheng-yu CHEN,Fu XIAO,Jian XU
    2015, 36(6):  49-59.  doi:10.11959/j.issn.1000-436x.2015118
    Asbtract ( 326 )   HTML ( 4)   PDF (1627KB) ( 1092 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of service-oriented computing, more and more Web services with the same or similar function are deployed on the Internet. Usually, before selecting the most suitable service, users need to predict QoS of unused services from the service invoking history. Due to the lack of effective supervision and constraint mechanisms, some number of the rows in the QoS sample matrix is often contaminated by the structural noise, which leads to a sharp decrease for QoS prediction performance. In order to address this problem, an efficient Web services QoS prediction approach via matrix completion with structural noise is proposed by formulating Web services QoS prediction problem as a L2,1-norm regularized matrix completion problem. The proposed approach can not only exactly detect the position where the data is contaminated, but also effectively predict the missing QoS values. Finally, experimental results performed on a real public dataset demonstrate the feasibility of our proposed approach.

    Cryptanalysis of novel extended multivariate public key cryptosystem
    Xu-yun NIE,Bo LIU,Gang LU,Ting ZHONG
    2015, 36(6):  60-65.  doi:10.11959/j.issn.1000-436x.2015182
    Asbtract ( 262 )   HTML ( 4)   PDF (706KB) ( 582 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the original multivariate public key cryptosystem to hide its weakness such as linearization equation.However,it is found that if there are many linearization equations satisfied by the original MPKC,there would be many quadratization equations (QE) satisfied by the improved scheme.Given a public key,after finding all QE,a valid cipheretext can be substituted into the QE to derive a set of quadratic equations on the plaintext variable.This exactly reduce the degree of the system wanted to solve.Then the corresponding plaintext can be recovered for a given valid ciphertext combining with Groebner basis method.

    ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN
    Xiao-guang NIU,Chuan-bo WEI,Wei-jiang FENG,Guo-jun PENG,Huan-guo ZHANG
    2015, 36(6):  66-77.  doi:10.11959/j.issn.1000-436x.2015143
    Asbtract ( 278 )   HTML ( 2)   PDF (1219KB) ( 664 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN).Firstly,the effect of the cluster size and the statistical property of fake packet injection on the privacy,latency and network traffic were analyzed.Then,an optimal non-uniformly statistic-source anonymity protocol (ONSA)was proposed to achieve source anonymity and reduce the network traffic.ONSA is designed to achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of non-uniform clusters.The simulation results demonstrate that ONSA significantly reduces the network traffic while providing source anonymity and meeting the system requirement of the delay.

    Optimization method through topology reconfiguration for mobile underwater wireless sensor networks
    Ming HE,Wen-hui LIANG,Qiu-li CHEN,Xi-liang CHEN,Jian CHEN
    2015, 36(6):  78-87.  doi:10.11959/j.issn.1000-436x.2015155
    Asbtract ( 466 )   HTML ( 4)   PDF (1959KB) ( 722 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The topology of mobile underwater wireless sensor networks (MUWSN) evolves dynamically with ocean currents,which will have great impact on network performance.To solve this problem,a topology optimization method for MUWSNs is proposed based on topology reconfiguration.Firstly,the proposed method optimizes the coverage rate of MUWSNs by adjusting the location of sensor nodes through simulating fish behaviors.Secondly,to optimize the connectivity of MUWSNs,the proposed method repairs disconnected positions and eliminates key nodes in MUWSN through using redundant nodes.Finally,simulation results verify the rationality and validity of the proposed method.Experimental results show that the algorithm can guarantee the network coverage is maintained at about 97%,connectivity rate above 89%,with lower energy consumption.

    High efficiency differential chaos shift keying modulation scheme without intra-signal interference
    Hua YANG,Guo-ping JIANG,Jun-yi DUAN
    2015, 36(6):  88-93.  doi:10.11959/j.issn.1000-436x.2015150
    Asbtract ( 288 )   HTML ( 1)   PDF (881KB) ( 584 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To eliminate the adverse effect brought by the intra-signal interference components in decision variables in high efficiency differential chaos shift keying system,a novel high efficiency differential chaos shift keying modulation scheme without intra-signal interference was proposed.By changing signal format of the chaotic carriers,the proposed scheme makes the two modulated chaotic signals transmitted in same time slot strictly orthogonal,which removes all possible intra-signal interference components from all decision variables clearly.It is shown by the analysis and simulation results that the proposed system has much better performance than HE-DCSK.

    Optimized coverage algorithm of wireless video sensor network based on quantum genetic algorithm
    Fu-you FAN,Guo-wu YANG,Qian-qi LE,Feng-mao LV,Chao ZHAO
    2015, 36(6):  94-104.  doi:10.11959/j.issn.1000-436x.2015152
    Asbtract ( 304 )   HTML ( 2)   PDF (1790KB) ( 905 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the construction needs of the smart city wireless video sensor network,an optimized network coverage algorithm based on quantum genetic algorithm is proposed.The algorithm fits in with complicated monitoring scene which has some different obstacles and different degree of importance.The monitoring region is depicted by two-dimensional discrete grid model,and the discrete grid model is represented by a code description matrix.The directional wireless video sensor is described by a seven-tuples.The mathematical programming model of the coverage problem is obtained by strict mathematical derivation.The optimized coverage algorithm is comprised by IntialDeployment and OptimizedDeployment algorithms,which takes the maximum coverage rate network deployment scheme as the solving goal.The quantum genetic algorithm with reasonable chromosome coding and optimized quantum rotation gate parameter is used to search the solution space,which has a good convergence rate and a fast computation speed.Two limit values of ideal coverage rate and ideal weighted coverage rate are introduced to evaluate the algorithm by the way of relative comparison.The result of simulation experiments and data analyses show that the solutions worked out by the algorithm can well approximate the ideal limit value.When the number of sensor nodes is given,the algorithm can obtain the maximum effective coverage rate.

    Diversity of controllable anonymous communication system
    Yan-wei ZHOU,Zhen-qiang WU,Bo YANG
    2015, 36(6):  105-115.  doi:10.11959/j.issn.1000-436x.2015138
    Asbtract ( 456 )   HTML ( 8)   PDF (1899KB) ( 902 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.

    Multi-authority attribute-based encryption access control model for cloud storage
    Zhi-tao GUAN,Ting-ting YANG,Ru-zhi XU,Zhu-xiao WANG
    2015, 36(6):  116-126.  doi:10.11959/j.issn.1000-436x.2015142
    Asbtract ( 480 )   HTML ( 18)   PDF (1824KB) ( 1780 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.

    Multi-party controlled quantum communication protocol
    Li-wei CHANG,Shi-hui ZHENG,Li-ze GU,Min LEI,Yi-xian YANG
    2015, 36(6):  139-148.  doi:10.11959/j.issn.1000-436x.2015221
    Asbtract ( 249 )   HTML ( 11)   PDF (1348KB) ( 624 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to satisfy the requirements of long-distance multi-node quantum networks,two multi-party controlledquantum communication protocols are put forward via maximally and partially entangled quantum channels.For the maximally entangled channels,projective measurements are used to realizemulti-party controlled joint remote preparation of an arbitrary four-qubitX-state.For the partially entangled channels,collective unitary operations and optimal positive operator-valued measures are used to realize multi-party controlled joint remote preparation of an arbitrary four-qubitX-state.The theoretical analysis shows that the efficiency of the first scheme can be up to 100% which is suprior to that of others.In addition,the efficiency of the second scheme is effectively improved and the way to be used to construct two kinds of measurement methods can be utilized in the similar protocols.

    Simple constellation shaping for BICM-ID
    Qi LI,Lin ZHOU,Bo ZHANG,Bao-ming BAI
    2015, 36(6):  149-156.  doi:10.11959/j.issn.1000-436x.2015117
    Asbtract ( 548 )   HTML ( 14)   PDF (911KB) ( 1188 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel method of constellation mapping is presented for bit-interleaved coded modulation (BICM) by combining geometry shaping with probabilistic shaping.The transmitted signal points of a practical signal constellation approach the optimal input distribution by exploiting a many-to-one mapping with some signal points unused.With this method,shaping gain can be achieved conveniently with the help of iterative decoding between demodulation and decoder.The optimizations of signal constellation and the mapping from symbols to signal points are performed by the analysis of capacity and the extrinsic information transfer chart.Simulation results show that the proposed constellation mapping outperforms the traditional Gray mapping for BICM with iterative decoding in both AWGN and Rayleigh channels.And the shaping gain achieved can be improved with the increase of the constellation size.

    summarize
    Recent development and its prospect of satellite communications
    Ke-chu1 YI,Yi LI,Chen-hua SUN,Chun-guo NAN
    2015, 36(6):  157-172.  doi:10.11959/j.issn.1000-436x.2015223
    Asbtract ( 1179 )   HTML ( 152)   PDF (624KB) ( 7887 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    After analyzing the characteristics of satellite communications,the developing status of communication satellite platform,available frequency resource,as well as the related key techniques are summarized.Through introducing some typical satellite communications systems,were presented the applications and industrialization of satellite communications,and furthermore shows the bright prospects.

    Academic communication
    Caching strategy based on node’s importance to community in information-centric networks
    Jun CAI,Shun-zheng YU,Wai-xi LIU
    2015, 36(6):  173-182.  doi:10.11959/j.issn.1000-436x.2015222
    Asbtract ( 330 )   HTML ( 2)   PDF (1034KB) ( 645 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In-network caching is one of the most important features of ICN (information-centric networks).A caching strategy based on node’s importance to community was proposed to make content objects cached more reasonable in temporal and spatial distribution.Within each community,the strategy not only caches content objects in those nodes where users are easy to access the content,but also makes different popularity of content objects more reasonable in temporal distribution.The CSNIC strategy was implemented under a variety of experimental conditions,and compare it with the previous strategies CEE-LRU,Betw-LFU and Opportunistic.The simulation results show that the strategy can yield a significant performance improvement,such as,cache hit ratio,hop reduction ratio,content diversity ratio and number of replacement.Furthermore,the additional overhead of CSNIC is small.

    Algorithm for the cloud service workflow scheduling with setup time and deadline constraints
    Hong SHEN,Xiao-ping LI
    2015, 36(6):  183-192.  doi:10.11959/j.issn.1000-436x.2015125
    Asbtract ( 382 )   HTML ( 10)   PDF (1533KB) ( 658 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cost minimization with deadline constraints and setup time is a new resource allocation optimization problem in cloud computing.An integer programming model is constructed for this NP-hard problem.A novel probability model and updating mechanism is suggested for sampling the solution space.A heuristic method is investigated for generating good initial population.A hybrid estimation of distribution algorithm (HEDA) is proposed for the considered problem.The global best solution is adopted to balance the diversification and intensification of HEDA.Experimental results show that the proposed method is effective to optimize the workflow running cost within reasonable CPU time.

    Collaborative filtering recommendation algorithm based on one-jump trust model
    Xing-mao WANG,Xing-ming ZHANG,Jiang-xing WU
    2015, 36(6):  193-200.  doi:10.11959/j.issn.1000-436x.2015130
    Asbtract ( 335 )   HTML ( 3)   PDF (1086KB) ( 947 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A collaborative filtering recommendation algorithm based on the trust network of social brings two problems that the choice of complex paths between nodes and the weak transfering of trust.Toward to these two problems,a one-jump trust model based on items was put forward,the model calculated the trust between users and items,defined the consumer’s trust attribute vector of social and calculated the direct and indirect distance one-jump by items,and then calculated the trust between users.A collaborative filtering algorithm(OneJ-TCF) is degined based on the model,moreover analysed and reorganized the relation between trust and similarity.The experiments show that this algorithm improves the degree of accuracy(reducing about 0.02 MAE),and saves about 50% training time at the same time.

    Iterative estimation method for random interleaver of Turbo codes
    Jun LIU,Jing LI,Pei-dong YU
    2015, 36(6):  201-206.  doi:10.11959/j.issn.1000-436x.2015140
    Asbtract ( 285 )   HTML ( 14)   PDF (966KB) ( 815 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Channel coding parameter analysis meant reversely analyzing and estimating the coding parameters,and was one of the key techniques for intelligent communication,information interception and so on.Since Turbo codes were widely used in communication systems,parameter estimation for their interleavers was of great importance.Focusing on the random interleaver of Turbo codes,an iterative estimation algorithm based on correlation decision between the soft outputs of the Turbo decoder was presented.The algorithm used soft-decisions of the demodulator output sequence.It overcame the shortcomings of existing methods which often aimed at certain interleaving structures only,and suffered from weak robustness since they used hard-decisions.Simulation results show that the proposed algorithm has better performance and relatively lower complexity,especially in low signal-to-noise ratio cases.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: