Please wait a minute...

Current Issue

    25 May 2010, Volume 31 Issue 5
    Papers
    Composite pulse multipath channel estimation method based on NN rule for IR-UWB
    Zhi-yong LIU,Qin-yu ZHANG,Nai-tong ZHANG
    2010, 31(5):  10-15.  doi:1000-436X(2010)05-0010-06
    Asbtract ( 0 )   HTML ( 0)   PDF (203KB) ( 16 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aimed at the problem that the current composite pulse ultipath channel estimation methods for impulse radio-ultra wideband (IR-UWB) system can’t solve the effect of pulse waveform distortion caused by ISI,a composite pulse multipath channel estimation method based on nearest neighbor (NN) rule was proposed.This estimated composite pulse multipath channel was subsequently used as a template in a correlator-based detector,and then the detection performance of template obtained by proposed method and conventional averaged method was compared in simulation.Simulation results show that when there is no ISI,the NN estimation method achieves similar BER performance as average method,when ISI is caused by overlap of symbols,the BER performance of NN estimation significantly outperforms that of the average method.

    Closed-ring feedback based multi-choke fairness algorithm for resilient packet rings
    Fang CHENG,Shi-guang HUANG,Zhi-yong YU,Zhi-zhong ZHANG
    2010, 31(5):  22-30.  doi:1000-436X(2010)05-0022-09
    Asbtract ( 0 )   HTML ( 3)   PDF (357KB) ( 101 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A closed-ring feedback based multi-choke based fairness algorithm was thereby presented.To avoid head-of-line blocking,a new fairness evaluation rule,i.e.,determining the source-node weight first and then the flow weight,was proposed and analyzed.Theoretical analysis and simulation results demonstrate that the given algorithm outperforms the existing schemes in terms of performance metrics such as avoiding the head-of-line blocking and the fairness.

    UC secure one-time signature based broadcast authentication
    Jun-wei ZHANG,Jian-feng MA,Li YANG
    2010, 31(5):  31-36.  doi:1000-436X(2010)05-0031-06
    Asbtract ( 0 )   HTML ( 0)   PDF (259KB) ( 151 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The provable security of one-time signature based broadcast authentication protocols was investigated.In the UC framework,a one-time signature based broadcast authentication model was proposed.Firstly,the one-time signature ideal functionality F OTSand the broadcast authentication ideal functionality F BAUTHwere formally defined in the model.Then,one-time signature protocol HORS+was proposed.At the same time,a broadcast authentication scheme p BAUTHwas designed in the (FOTS,F REG)-hybrid model.Finally,based on the scheme p BAUTH,a new broadcast authentication protocol was then obtained by the combined use of HORS+.The result shows that HORS+securely realizes the ideal functionality FOTS,and p BAUTHalso realizes the ideal functionality F BAUTH.According to the composition theorem in the UC framework,the composed broadcast authentication protocol is UC secure and can be applied to broadcast the authenticated message in the resource-limited networks.

    ID-based transitive signature schemes without random oracle
    Xiao-long MA,Li-ze GU,Wei CUI,Yi-xian YANG,Zheng-ming HU
    2010, 31(5):  37-43.  doi:1000-436X(2010)05-0037-07
    Asbtract ( 0 )   HTML ( 0)   PDF (240KB) ( 23 )   Knowledge map   
    References | Related Articles | Metrics

    Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s transitivity of the proposed scheme was reduced to the CDH assumption based on the bilinear pairing.A complexity analysis of the proposed scheme was thereafter presented.

    Design of wavelength rotation graph model applied in wavelength switching optical network
    Ji-jun ZHAO,Shu-guang ZHANG,Wen-yu ZHAO
    2010, 31(5):  44-50.  doi:1000-436X(2010)05-0044-07
    Asbtract ( 0 )   HTML ( 0)   PDF (338KB) ( 272 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on distributing uniformly virtual network topology links and associated wavelengths to the surface of rotating sphere,a new wavelength rotation graph model of wavelength switching optical network (WSON) was constructed,and a creative method to solve the routing and wavelength assignment(RWA)problems was proposed.The simulation results show that if the wavelength number of each link is set separately to 4 and 8,the average blocking probability of the RWA based on the rotation graph model reduces by 5.03% and 9.71%,and the average resource utilization increases by 3.3% and 1.54% respectively,as compared with the existing model.This method would be useful for solving the problem of optical network RWA which has wavelength conversion capabilities.

    Extended integer tent maps and dynamic hash function
    Jian-dong LIU
    2010, 31(5):  51-59.  doi:1000-436X(2010)05-0051-09
    Asbtract ( 0 )   HTML ( 0)   PDF (304KB) ( 261 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance of the middle iteration process of the hash function was enhanced without extending intermediate states.Preliminary security testing indicates that,this hash function has a high degree of security,and it can be realized easily with great rapidity.The algorithm of hash function is an ideal subsititution for traditional hash function.

    Application study of Costas arrays in multiuser radar systems
    Jian-guo YAO,Qing HUANG
    2010, 31(5):  60-72.  doi:1000-436X(2010)05-0060-13
    Asbtract ( 0 )   HTML ( 0)   PDF (635KB) ( 82 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The construction and performance of frequency hopping codes were discussed but the emphasis was laid on the construction of Costas arrays.The frequency hopping codes called Costas arrays could be designed to have almost ideal auto-ambiguity and good cross-ambiguity.A mathematical model was established for frequency hop coded waveforms and the conditions for orthogonal sub-pulse were given.The auto-and cross-correlation properties of Costas arrays were illuminated,the practical properties of cross-correlation function of permutation matrices were revealed,the algorithms for computing ambiguity function were presented and the simulation results were demonstrated.After a study of the cross-ambiguity properties of Costas arrays the ways were suggested to reduce interference in a multiuser radar system.

    Chosen-key extracting attack to random LSB steganography
    Jia-yong CHEN,Yue-fei ZHU,Wei-ming ZHANG,Jiu-fen LIU
    2010, 31(5):  73-80.  doi:1000-436X(2010)05-0073-08
    Asbtract ( 0 )   HTML ( 1)   PDF (268KB) ( 355 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the character of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.

    Robust decoding algorithm for low-density parity-check codes in a mixture of SaS and G aussian interference
    Zhi-jiang XU,Kang WANG,Li-min MENG
    2010, 31(5):  81-86.  doi:1000-436X(2010)05-0081-06
    Asbtract ( 0 )   HTML ( 0)   PDF (266KB) ( 27 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Symmetric alpha-stable (S S)noise was introduced into a statistical model of impulse noise e ironment,andα the interference in the receiver was a mixture of AWGN and SαS noise.Based on the above model,the probability density function (PDF) of the mixed noise was analyzed by numerical methods,and a robust MPA (RMPA) was proposed to account for the impulse environment.The simulations show that the bit error rate (BER) performance of the proposed RMPA is good and robust.

    PFM:a SMS4 algorithm against high-order power analysis attacks
    Lang LI,Ren-fa LI,Jing LI,Ke-shou WU
    2010, 31(5):  87-92.  doi:1000-436X(2010)05-0087-06
    Asbtract ( 0 )   HTML ( 0)   PDF (233KB) ( 232 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A fixed-value mask algorithm for SMS4 was proposed in order to resist power analysis attack based SMS4.Firstly,an atomic mask algorithm of SMS4 was designed to resist against high-order power analysis attack based on the study of the structure of SMS4 algorithm,the intermediate variables were masked in the method.Secondly,pseudo-random fixed-value mask method (PFM) was proposed based on the above method,when its hardware implementation aiming at low power and less areas was considered about.Moreover,PFM has the ability to resist against high-order power analysis attacks when applied to the sensor node of special environment of communication.Finally,the experimental results show that the proposed algorithm has the ability to effectively resist second high-order differential power analysis attack without increasing much power and hardware resources.

    Study of relationships between correlation-immunity and balanceness based on Boolean functions
    Wei-wei LI
    2010, 31(5):  93-97.  doi:1000-436X(2010)05-0093-05
    Asbtract ( 0 )   HTML ( 1)   PDF (185KB) ( 73 )   Knowledge map   
    References | Related Articles | Metrics

    E-derivative and derivative were introduced to deeply study internal structure of Boolean function,and analyzed the cryptographic properties of Boolean function,which was a new subject in cryptology.The relationships between correlation-immunity and balanceness was analyzed,and obtain some important results which could not be obtained by analyzing the exterior structure of Boolean function at all.Beyond that,for researching on the correlation immunity of balanced H-Boolean function which play a important role in cryptology,here also give a new research methods to improve the anti-attack ability of cryptosystem.

    Technical Reports
    ON-CRP:cache replacement policy for opportunistic networks
    Hui YE,Zhi-gang CHEN,Ming ZHAO
    2010, 31(5):  98-107.  doi:1000-436X(2010)05-0098-10
    Asbtract ( 0 )   HTML ( 0)   PDF (327KB) ( 285 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel cache replacement policy was proposed,which referred as ON-CRP(opportunistic networking cache replacement policy).Differing from most of existing policies,ON-CRP choosed the data item to replace based on the correlation between the nodes and the item.It utilized the probability of destination-matching to judge the correlation which was gotten from humans’ mobile patterns.Moreover,the visit and update frequency ratio was used to design the standard of cache data replacement.The simulation results show that ON-CRP policy can reduce the latency of remote data access.Furthermore,the resource consumption is reduced about 30% while cache hit ratio of data is improved about 10%~30%.

    Research on DoS detection and reaction of SIP application
    Shui-fei ZENG,Guang-yu HE,Ying-you WEN,Ren-bo WANG
    2010, 31(5):  108-112.  doi:1000-436X(2010)05-0108-05
    Asbtract ( 0 )   HTML ( 0)   PDF (197KB) ( 179 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To resolve the SIP DoS hidden trouble in the ALL-IP fusion network,a novel detection and reaction method was proposed.First,the characteristic of SIP DoS behavior was analyzed deeply to enhance the pertinency of detection.Afterwards,the method used the improved SIP transaction-finite automation(IST-FA) to detect the DoS attacks.Finally,the method took the reaction based on the puzzle chall ge mechanism.Simulation and analysis show that the efficiency and performance of the method can satisfy the requirement of SIP DoS prevention.

    Comprehensive Review
    Study status and prospective of multiview video coding
    Jun-yan HUO,Yi-lin CHANG,Ming LI,Yan-zhuo MA
    2010, 31(5):  113-121.  doi:1000-436X(2010)05-0113-09
    Asbtract ( 0 )   HTML ( 0)   PDF (305KB) ( 510 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The main reasons of multiview video coding (MVC) were described.Firstly,the architecture and evolutional history of MVC was introduced.Then,the key technolog of MVC were discussed in detail including prediction structure,techniques to improve the coding efficiency and high level syntax.Finally,conclusions were drawn and future research directions for MVC in 3D video applications were put forward.

    Concise Papers
    Inter-carrier interference mitigation based on precoder design
    Xia WANG,Shi-hua ZHU
    2010, 31(5):  122-127.  doi:1000-436X(2010)05-0122-06
    Asbtract ( 0 )   HTML ( 0)   PDF (255KB) ( 121 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the inter-carrier interference (ICI) coefficients characteristic caused by the normalized frequency offset in orthogonal frequency division multiplexing (OFDM) systems,a general precoder design scheme was proposed for OFDM mobile systems.The linear precoder at transmitter could make the ICI coefficient to be concentrated on a few subcarriers and be set zero at other subcarriers.The interference matrix at receiver would be replaced by a sparse matrix,and signal detection could be simplified.Both theoretical analysis and simulation results were presented for the proposed scheme.Compared with existing mitigation ICI schemes with equalization,the proposed scheme has lower computational complexity,and compared with self-cancellation scheme,the bandwidth efficiency is improved.

    QoS-based sensing scheduling protocol for wireless sensor networks
    Dao-yuan YAO,Hai-lin WANG,Bao-xian ZHANG,Hai-tao LIU
    2010, 31(5):  128-134.  doi:1000-436X(2010)05-0128-07
    Asbtract ( 0 )   HTML ( 0)   PDF (255KB) ( 43 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To satisfy the requirements of event detected latency ding to different applications with unbalanced node density in randomly deployed large-scale wireless sensor networks,an adaptive distributed sensing scheduling protocol (ADSSP)which adaptively adjusts the duty cycles of sensor nodes based on node density and balances the energy consumption among sensor nodes was proposed.Compared with the random scheduling protocol,ADSSP can provide guaranteed lower average detection latency and also prolong the network lifetime up to 30 percent under the same situation.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: