Please wait a minute...

Current Issue

    25 February 2018, Volume 39 Issue 2
    Papers
    Cross-network access control mechanism for complex network environment
    Fenghua LI,Tianzhu CHEN,Zhen WANG,Linjie ZHANG,Guozhen SHI,Yunchuan GUO
    2018, 39(2):  1-10.  doi:10.11959/j.issn.1000-436x.2018019
    Asbtract ( 567 )   HTML ( 31)   PDF (821KB) ( 1489 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.,integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control,sticky policies and inconsistent operation semantics.To satisfy these requirements,cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all,the process of mapping was illustrated using the example of space-ground integrated networks.Next,a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.

    Routing optimization based on topology control in satellite network
    Xiaogang QI,Jiulong MA,Lifang LIU
    2018, 39(2):  11-20.  doi:10.11959/j.issn.1000-436x.2018020
    Asbtract ( 731 )   HTML ( 25)   PDF (1040KB) ( 1709 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new double-layer satellite network model for space networking was established and a routing algorithm based on topology control (TCRA) was proposed considering the advantages of low earth orbit and stationary earth orbit satellite networks.This model used virtual node strategy and satellite grouping idea,which regarded the coverage area of each low earth orbit satellite as a virtual node.The network took into account the influence of the polar area on the division of the satellite footprints,such that the upper management satellites can accurately acquire the topology of the lower satellites.Using the improved virtual node strategy,the time slices were superior to other network models in quantity,length and other aspects.Based on the network topology,stationary earth orbit satellites calculate routing for low earth orbit satellites,while low earth orbit satellites were responsible for forwarding data.The simulation results show that the routing algorithm is superior to other algorithms in average end-to-end delay and packet loss rate.

    Three-party password authenticated key agreement protocol with user anonymity based on lattice
    Caifen WANG,Li CHEN
    2018, 39(2):  21-30.  doi:10.11959/j.issn.1000-436x.2018021
    Asbtract ( 482 )   HTML ( 10)   PDF (630KB) ( 1257 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.

    SDN security control and forwarding method based on cipher identification
    Xi QIN,Guodong TANG,Chaowen CHANG
    2018, 39(2):  31-42.  doi:10.11959/j.issn.1000-436x.2018022
    Asbtract ( 368 )   HTML ( 10)   PDF (1066KB) ( 1035 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.

    Beamforming design for energy-constrained full-duplex two-way relaying system
    Wei WANG,Liyuan AN,Guoan ZHANG,Shibing ZHANG
    2018, 39(2):  43-52.  doi:10.11959/j.issn.1000-436x.2018023
    Asbtract ( 329 )   HTML ( 6)   PDF (967KB) ( 939 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A beamforming design was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.A utility optimization problem was considered aiming to maximize the harvested energy by jointly optimizing the beamforming matrix,the power splitting ratio at the relay and the transmit powers at the sources.Since the formulated joint optimization problem was nonconvex,it was difficult or even intractable to obtain the global optimal solution.To overcome this issue,the objective problem into three subproblems was decoupled which could be solved by the proposed semidefinite relaxation technique and the derived constraints activation solution,respectively.The solution was finally obtained with the proposed convergent iterative algorithm.Simulation results show that the proposed joint optimization scheme achieves the optimal performance.Compared with the traditional half-duplex (HD) algorithm,the proposed algorithm can obtain 2~3 times energy harvesting (EH) efficiency improvement,while the computational complexity increases slightly.

    Neural network model for dependency parsing incorporating global vector feature
    Hengjun WANG,Nianwen SI,Yulong SONG,Yidong SHAN
    2018, 39(2):  53-64.  doi:10.11959/j.issn.1000-436x.2018024
    Asbtract ( 432 )   HTML ( 7)   PDF (775KB) ( 1306 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    LSTM and piecewise CNN were utilized to extract word vector features and global vector features,respectively.Then the two features were input to feed forward network for training.In model training,the probabilistic training method was adopted.Compared with the original dependency paring model,the proposed model focused more on global features,and used all potential dependency trees to update model parameters.Experiments on Chinese Penn Treebank 5 (CTB5) dataset show that,compared with the parsing model using LSTM or CNN only,the proposed model not only remains the relatively low model complexity,but also achieves higher accuracies.

    Partially blind proxy re-signature scheme with proven security
    Xiaodong YANG,Chunlin CHEN,Ping YANG,Faying AN,Tingchun MA,Caifen WANG
    2018, 39(2):  65-72.  doi:10.11959/j.issn.1000-436x.2018014
    Asbtract ( 352 )   HTML ( 5)   PDF (689KB) ( 809 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially blind proxy re-signature was also given.Based on the improved Shao scheme,a partially blind proxy re-signature scheme in the standard model was proposed.The proposed scheme allows proxy to add some public information negotiated by delegatee and proxy to re-signature.The scheme not only can achieve the transparent signature conversion from delegatee to proxy and protect privacy of message re-signed by proxy,but also prevented illegal use of re-signature.Analysis results show that the proposed scheme is correct,multi-use,partially blind and existentially unforgeable.It is more suitable for e-government data exchange system,cross-domain authentication system and so on.

    Moving target defense against network eavesdropping attack using POF
    Duohe MA,Qiong LI,Dongdai LIN
    2018, 39(2):  73-87.  doi:10.11959/j.issn.1000-436x.2018025
    Asbtract ( 592 )   HTML ( 15)   PDF (1802KB) ( 1101 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.

    Collision analysis of the GMR-2 cipher used in the satellite phone
    Ruilin LI,Jiao HU,Chaojing TANG
    2018, 39(2):  88-95.  doi:10.11959/j.issn.1000-436x.2018026
    Asbtract ( 602 )   HTML ( 9)   PDF (688KB) ( 1055 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge,the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed,which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number,a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2?8.248,which is far higher than the ideal collision probability 2?120.This proves once again,that there exists serious potential security hazards in the GMR-2 cipher.

    Proxy re-encryption based multi-factor access control scheme in cloud
    Mang SU,Guozhen SHI,Anmin FU,Yan YU,Wei JIN
    2018, 39(2):  96-104.  doi:10.11959/j.issn.1000-436x.2018028
    Asbtract ( 526 )   HTML ( 19)   PDF (1872KB) ( 1337 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.

    Fast bidirectionally-decodable arithmetic coding with chaotic redundancy and threshold control
    Yi YAN,Guofang TU,Can ZHANG,Shaoshuai GAO,Deyuan CHEN
    2018, 39(2):  105-113.  doi:10.11959/j.issn.1000-436x.2018029
    Asbtract ( 655 )   HTML ( 5)   PDF (2523KB) ( 877 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Although the JPEG2000 compression standard has high coding efficiency,its error resistance and security can’t meet the requirements of practical application.Based on this,a fast bidirectionally-decodable arithmetic coding method with chaotic redundancy and threshold control was proposed.At the encoder,the chaotic map controlled the probabilities of multiple redundant symbols to enhance the security of arithmetic coding.At the decoder,threshold control and bidirectional decoding were combined to realize fast decoding based on maximum a posteriori estimation.Simulation results show that the proposed method improves the reconstructed image quality with better error resistance and security.

    Method on PAPR reduction in digital beam-forming
    Lu LIU,Guoqing ZHAO
    2018, 39(2):  114-121.  doi:10.11959/j.issn.1000-436x.2018030
    Asbtract ( 430 )   HTML ( 4)   PDF (782KB) ( 926 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Digital beam-forming technology is one of the key technologies in 5G communication.However,the high peak-to-average power ratio in digital beam-forming would make the power amplifier work in the nonlinear region.Nowadays,the solutions to the high peak-to-average power ratio,such as selected mapping,embedded side information selected mapping have some faults:the complexity is high,and the utilization of the bandwidth is low.A blind selected mapping method to reduce the high peak-to-average power ratio based on MUSIC algorithm was proposed.In this method,the side information was omitted,so the utilization of the bandwidth was improved.Simultaneously,the result of the peak-to-average power ratio reduction and the complexity is much more enhanced.

    Fingerprint template protection by adopting random projection based on re-encryption
    Shan JIA,Zhengquan XU,Chuanbo HU,Hao WANG
    2018, 39(2):  122-134.  doi:10.11959/j.issn.1000-436x.2018031
    Asbtract ( 414 )   HTML ( 10)   PDF (1307KB) ( 1675 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In random projection (RP) based biometric template protection methods,the generated template and key are vulnerable to attacks,which may cause the leakage of users’ privacy.To solve this problem,an improved RP-based fingerprint template protection method was proposed.First,based on the RP result,the proposed method divided the projection domain into fingerprint matching domain and noise adding domain that were mutually independent,then fused them with two sub-matrices of the random projection matrix and saved the result as template.In addition,re-encryption mechanism was introduced to realize secure storage and transmission of the key (RP matrix).Experimental results show that the proposed method can achieve stronger ability to resist different attacks than existing RP-based biometric template protection methods,and also guarantee high matching accuracy and revocation.

    Comprehensive Reviews
    Advances in generative adversarial network
    Wanliang WANG,Zhuorong LI
    2018, 39(2):  135-148.  doi:10.11959/j.issn.1000-436x.2018032
    Asbtract ( 1421 )   HTML ( 91)   PDF (1477KB) ( 4234 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Generative adversarial network (GAN) have swiftly become the focus of considerable research in generative models soon after its emergence,whose academic research and industry applications have yielded a stream of further progress along with the remarkable achievements of deep learning.A broad survey of the recent advances in generative adversarial network was provided.Firstly,the research background and motivation of GAN was introduced.Then the recent theoretical advances of GAN on modeling,architectures,training and evaluation metrics were reviewed.Its state-of-the-art applications and the extensively used open source tools for GAN were introduced.Finally,issues that require urgent solutions and works that deserve further investigation were discussed.

    Recent advances and future challenges of four key resources cooperation in cognitive radio network
    Xianzhong XIE,Ying LUO,Ke YAN,Jiujiu CHEN
    2018, 39(2):  149-163.  doi:10.11959/j.issn.1000-436x.2018033
    Asbtract ( 337 )   HTML ( 15)   PDF (898KB) ( 1009 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cognitive radio (CR) can improve spectrum utilization by spectrum sharing or cooperation between the primary user and secondary users.It is well known that energy,interference and relay are also three key resources in cognitive radio network (CRN).Energy cooperation or sharing between the primary user and secondary user will further promote energy efficiency.Energy harvesting from RF interference signal can turn bane (interference) into a boon (green energy).Secondary user relay data of the primary user can enhance QoS of the primary user,also get some opportunities for their own transmission.Thus,four resources cooperation (spectrum,energy,interference,relay) in CRN will improve simultaneously both spectrum efficiency and energy efficiency,and also increase throughput and QoS.The overviews for collaborative utilization problems of four key resources in CRN was given.Firstly,collaboration models of four key resources were analyzed.Then,recent research advances were summarized,including three kinds of resources collaborative utilization (both energy harvesting and relay transmission,both energy cooperation and energy harvesting) and four resources collaborative utilization (simultaneous relay transmission,energy harvesting and energy cooperation) in CRN.Further,some potential challenges of four key resources cooperation in CRN were discussed.Finally,some key future research directions was concluded.

    Correspondences
    WSN data gathering algorithm based on compressive sensing and matrix completion technique
    Ce ZHANG,Ou LI,Xin TONG,Yanping YANG
    2018, 39(2):  164-173.  doi:10.11959/j.issn.1000-436x.2018034
    Asbtract ( 421 )   HTML ( 10)   PDF (834KB) ( 1244 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The unreliable links and packet losing are ubiquitous in WSN.The performance of data collection algorithm based on compressive sensing is sensitive to packet losing.Firstly,the relationship between packet loss rate and CS-based reconstruction precision was analyzed,and the sparsest block measurement (SBM) matrix was formulated to keep the data gathering consumption smallest and make sure the low-rank property of measurements.Then,combined with the matrix completion (MC) and compressive sensing (CS),the CS data gathering algorithm based on sparsest block measurement matrix (CS-SBM) algorithm was proposed.CS-SBM gathered data in a period and recovered the loss data based on MC to weaken the impact of packet loss on data gathering.CS-SBM reconstructed data based on CS to reduce measurement number and energy consumption and prolong the network lifetime.Simulation analysis indicates that the proposed algorithm reconstruct the whole data with high-accuracy under 50% packet loss rate,resisting unreliable links effectively.

    Research on the game of information security investment based on the Gordon-Loeb model
    Qin WANG,Jianming ZHU
    2018, 39(2):  174-182.  doi:10.11959/j.issn.1000-436x.2018027
    Asbtract ( 407 )   HTML ( 12)   PDF (1105KB) ( 808 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to study the impacts of externalities of information security investment,the Gordon-Loeb model was extended to a multi-organization game environment.The relationships of the optimal information security investment with vulnerability,potential loss and investment effectiveness when confronted with different attack types under the positive and negative externalities were obtained respectively,and the difference with the optimal information security investment under the social optimum condition was compared.The results show that there were some similarities in the varying pattern of information security investment between the condition of the positive externality and a single organization,but information security investment under the negative externality changes greatly and was generally more cautious,and attack types also have important impacts on information security investment.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: