Please wait a minute...

Current Issue

    25 September 2018, Volume 39 Issue 9
    5G and Cognitive and Cooperative Network
    SCMA codebook design based on resource block constellation
    Xiaotao SHAO,Mingkun GUO,Wei YANG
    2018, 39(9):  1-9.  doi:10.11959/j.issn.1000-436x.2018154
    Asbtract ( 725 )   HTML ( 22)   PDF (809KB) ( 1382 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problems of typical sparse code multiple access codebook design scheme based on multidimensional mother constellation that the complexity is high and the minimum Euclidean distance between constellation points on resource blocks is difficult to determine,a SCMA codebook design scheme based on resource block constellation was proposed.By converting the design of multidimensional mother constellation into the design of two-dimensional resource block constellation,the design complexity of constellation was reduced.And the codebook design scheme starting from resource block constellation could maximize the minimum Euclidean distance between constellation points on resource blocks,which was better than the design method in which user codebooks were obtained from multi-dimensional mother constellation.Simulation results show that the proposed SCMA codebook design scheme based on resource block constellation can significantly improve the BER performance of system compared with the typical codebook design scheme based on multidimensional mother constellation.

    Optimal cooperative strategy based on quantum bat for cognitive radio of energy harvesting
    Hongyuan GAO,Yanan DU,Shibo ZHANG,Dandan LIU
    2018, 39(9):  10-19.  doi:10.11959/j.issn.1000-436x.2018149
    Asbtract ( 1278 )   HTML ( 8)   PDF (949KB) ( 921 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reduce energy consumption and improve spectral efficiency of the cognitive relay wireless communication system in 5G network,an optimal cooperative transmission strategy of information and energy was designed for cognitive relay radio with wireless energy harvesting.For the proposed optimal cooperative strategy,the maximal throughput formula and outage probability of secondary user were deduced.In order to resolve the derived maximum throughput equation,a quantum bat algorithm which was based on the optimization mechanism of quantum computing and bat algorithm was designed to solve the deduced equation,and the optimal cooperative transmission scheme for information and energy could be obtained.Simulation results show that the proposed optimal cooperative strategy not only can meet the information transfer demand of primary user,but also can realize the energy self-supply of the secondary user system and improve the communication quality of the secondary user.The proposed optimal cooperative strategy has a better performance than the cooperative strategy of existing cognitive relay radio for different simulation scenarios.

    Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination
    Rui ZHAO,Xing TAN,Yuanjian LI,Yucheng HE,Chunguo LI
    2018, 39(9):  20-30.  doi:10.11959/j.issn.1000-436x.2018155
    Asbtract ( 315 )   HTML ( 8)   PDF (947KB) ( 959 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as untrusted nodes in some certain circumstances.Based on this,to enhance the secrecy performance of untrusted relay systems,a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity,a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination,the power allocation optimization scheme between the source and destination was designed,and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis,the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore,based on different asymptotic cases,the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved,which reveals the advantages of the proposed FDJ-OAS scheme.

    Study on adaptive modulation in D2D communications over Nakagami-m fading channel
    Xiaoping ZENG,Haiwei MAO,Fan YANG,Xin JIAN,Shiqi LI,Xin JIANG,Wei FANG
    2018, 39(9):  31-42.  doi:10.11959/j.issn.1000-436x.2018151
    Asbtract ( 435 )   HTML ( 12)   PDF (961KB) ( 774 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel adaptive modulation based on nondata-aided error vector magnitude (NDA-EVM) was proposed to solve the problem of lower spectral efficiency in device to device (D2D) communication over Nakagami-m fading channel.The NDA-EVM was used to evaluate the channel quality.The relationship between NDA-EVM and symbol error ratio (SER) was derived according to the maximum likelihood method.Thereafter,the adaptive modulation mechanism of MQAM with the SER constraint was designed.Considering the joint effect of finite-length queuing and fading channel,the system packet loss rate and spectral efficiency was analyzed.Theoretical analysis and simulation experiments show that NDA-EVM based adaptive modulation accurately gives the modulation threshold and evaluates the relationship between QoS and packet loss rate,the proposed algorithm improves system spectral efficiency while maintaining low algorithm complexity,spectral efficiency improves by 0.752 bit·(s·Hz)-1,compared with traditional algorithm.

    EM-based blind LDPC identification in multipath channels
    Yu LIU,Fanggang WANG,Jingwen ZHANG,Bo AI,Zhangdui ZHONG
    2018, 39(9):  43-48.  doi:10.11959/j.issn.1000-436x.2018153
    Asbtract ( 392 )   HTML ( 9)   PDF (768KB) ( 707 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the advent of cognitive radios,blind encoder identification has attracted increasingly attentions since it plays an important role.The existing works mainly focus on additive white Gaussian noise (AWGN) channel,while the blind identification in multipath scenarios has not been sufficiently investigated.Considering the blind low density parity-check (LDPC) codes identification in the presence of unknown multipath fading channel,a likelihood-based classifier was proposed using the expectation maximization (EM) algorithm to obtain the maximum likelihood estimates of the unknown parameters.Then,an average log-likelihood ratio (LLR) estimator was adopted to classify the unknown encoder.Numerical results show that the proposed algorithm provides promising identification performance in multipath channels,especially in the low signal-to-noise ratio region.

    Distance criterion-based quantizer design for cooperative spectrum sensing
    Yuanhua FU,Zhiming HE
    2018, 39(9):  49-56.  doi:10.11959/j.issn.1000-436x.2018150
    Asbtract ( 262 )   HTML ( 3)   PDF (1149KB) ( 767 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In terms of sensing node’s energy and reporting channel’s bandwidth constrains problem for cooperative spectrum sensing in cognitive radio networks,an optimal quantizer design method based on distance criterion was proposed.First of all,the Bhattacharyya distance of received quantized data at the fusion center (FC) was calculated as performance criteria,the optimization mathematical model of the quantizer was constructed,and the optimum quantization thresholds were obtained by using particle swarm optimization algorithm.According to received sensing nodes’ quantized data at the FC,a log-likelihood ratio detector was constructed to decide the presence or absence of primary user signal,the upper bound to sensing performance of energy detector that without quantization was derived.Compared with the existing methods in literatures,the performance of proposed 3-bit quantization method approaches to the upper bound performance of energy detector,under the premise of obtaining comparable detection performance,the requirement of communication bandwidth is reduced.

    Research on the NOMA performance in cognitive cooperation network
    Meiling LI,Ying LI,Muhaidat SAMI,Zengshou DONG,Anhong WANG,Jie LIANG,Liping DING
    2018, 39(9):  57-66.  doi:10.11959/j.issn.1000-436x.2018152
    Asbtract ( 397 )   HTML ( 23)   PDF (964KB) ( 1192 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The non-orthogonal multiple access (NOMA) technology was studied in a downlink cognitive relay cooperation network.A cognitive multiuser relay cooperation based NOMA scheme was proposed (CM-RC-NOMA),in which,the outage performance of PU and SU were given under different cognitive relay cooperation schemes and the corresponding outage expressions were also derived.At the same time,the AF based relay cooperation method and the DF based relay cooperation method were compared.The simulation results show that the lower outage of PU can be achieved by AF method compared with DF method,when the channel condition of BS to PU is no more than that of SU to PU.It is also revealed that the optimal outage performance of PU can be achieved by the proposed best cognitive relay cooperation scheme in contrast to the traditional best cognitive relay cooperation scheme.

    Resource allocation in cognitive radio network with energy harvesting
    Yan LONG,Xiaoqian ZHANG,Xuming FANG,Rong HE
    2018, 39(9):  67-75.  doi:10.11959/j.issn.1000-436x.2018162
    Asbtract ( 349 )   HTML ( 6)   PDF (802KB) ( 972 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the diversity of energy harvesting capability and spectrum sensing accuracy of SU,as well as dynamic channel quality,under the constraint of energy causality,the secondary network throughput maximization problem in single-hop cognitive radio networks with energy harvesting was studied.The transmission channel selection,transmission power control and transmission time allocation of SU were jointly optimized.Since the optimization problem was non-convex,by converting it into a series of convex optimization sub-problems,the optimize transmission power and transmission time algorithm (OPTA) was obtained.Compared with the existing resource allocation algorithms,such as,hybrid differential evolution algorithm (HDEA),optimized transmission algorithm (OTA),and random assignment channel algorithm (RA),the simulation results verify the correctness and effectiveness of the proposed algorithm.For example,under the same maximum transmission power constraint,the throughput of the proposed OPTA scheme could increase by around 6%,37% and 50% than that of HDEA,OTA and RA schemes respectively.Under the same channel gain diversity,the throughput of the proposed OPTA scheme could increase by around 30%,60% and 94% than that of HDEA,OTA and RA schemes respectively.Under the same energy harvesting efficiency diversity,the throughput of the proposed OPTA scheme could increase by around 27%,50% and 92% than that of HDEA,OTA and RA schemes respectively.

    Optical Transmission System and Optical Network Optimization
    Novel node upgradation strategy for migration to elastic optical networks
    Xiaodong FU,Yongcheng LI,Gangxiang SHEN
    2018, 39(9):  76-83.  doi:10.11959/j.issn.1000-436x.2018158
    Asbtract ( 358 )   HTML ( 7)   PDF (915KB) ( 948 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For migration from dense wavelength division multiplexing (DWDM) networks to elastic optical networks (EON),it is required to upgrade the traditional reconfigurable optical add-drop multiplexer (ROADM) to the new-generation ROADM that supports flexible grids.However,for a large-scale optical network,it is generally impossible to upgrade the ROADM nodes all in once; rather,they would be upgraded gradually.For this,it is critical to study different strategies for selecting the ROADM nodes to be upgraded.Also,for the interconnection between different generations of ROADM,the sub-band virtual concatenation (VCAT) technique was employed to enable an optical channel to be established via traversing different types of nodes.An integer liner programming (ILP) model and an efficient heuristic algorithm were developed to jointly select the ROADM nodes to upgraded and assign spectrum resources.Simulation studies show that the proposed strategy for the upgraded node selection is efficient to perform close to the ILP model in terms of the maximum number of FS used in the whole network.

    Layered bandwidth allocation algorithm for multi-service in orthogonal frequency division multiplexing passive optical network
    Yejun LIU,Yuying LIU,Pengchao HAN,Jidong WANG,Lei GUO
    2018, 39(9):  84-93.  doi:10.11959/j.issn.1000-436x.2018159
    Asbtract ( 413 )   HTML ( 10)   PDF (841KB) ( 780 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the superiority in large bandwidth capacity and flexible resource allocation,orthogonal frequency division multiplexing passive optical network (OFDM-PON) has been recognized as one of the promising candidates for the next generation PON.There are many research works on the system architecture design of OFDM-PON.However,most of these works focused on the techniques of physical structure and signal transmission and less addressed the bandwidth allocation algorithms supporting the new types of system architecture.The bandwidth allocation in OFDM-PON,which is one of the key techniques to enable the access of multi-service,refers to the joint optimization of multi-dimensional resources in time domain,frequency domain and bits.A layered bandwidth allocation algorithm was proposed for multi-service in the enhanced system architecture of OFDM-PON,aiming at the efficient bandwidth resource utilization.Simulation results prove that the proposed bandwidth allocation algorithm outperforms the conventional algorithms without layered transmission significantly in terms of resource utilization and packet delay.

    Resource allocation mechanism in the TWDM-PON and C-RAN joint architecture with hybrid energy supply
    Ruyan WANG,Ningning XU
    2018, 39(9):  94-109.  doi:10.11959/j.issn.1000-436x.2018156
    Asbtract ( 280 )   HTML ( 8)   PDF (913KB) ( 932 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problems of low resource utilization rate,high energy consumption and poor user service quality in the existing virtualized Cloud Radio Access Network,an energy-aware virtualized resource allocation mechanism with hybrid energy supply was proposed.According to the energy sources and energy consumption of different network devices,energy arrival and energy consumption models were established.Furthermore,under the premise of guaranteeing the quality of user services,considering proportional fairness and energy consumption optimization,distributed algorithms based on asynchronous update were used to allocate resources and harvested energy for different types of virtual cloud radio access networks and user virtual base stations to effectively improve the energy efficiency of network.The simulation results show that the proposed resource allocation mechanism can reduce energy consumption while effectively reducing the latency and improving the throughput.

    Energy-efficient dynamic wavelength and bandwidth allocation algorithm with delay constraint for time and wavelength division multiplexed passive optical networks
    Cunqian YU,Mingzhu TANG,Rongxi HE
    2018, 39(9):  110-121.  doi:10.11959/j.issn.1000-436x.2018160
    Asbtract ( 487 )   HTML ( 9)   PDF (1169KB) ( 854 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on offline scheduling and node modular design,an energy-efficient dynamic wavelength and bandwidth allocation algorithm with the delay constraint (EE-DWBA-DC) was proposed.Optical line terminal (OLT) and optical network units (ONU) were considered to save energy.Under the constraint of packet delay,the number of active wavelengths could be reduced as much as possible and the length of polling cycle was increased.At the same time,the uplink and downlink transmission time of OLT and ONU were concentrated to reduce the state conversion times and extend its low-power duration.In addition,the high energy consumption voids of channels were attempted to be minimized.The simulation results verify that the proposed algorithm can reduce the energy consumption of OLT and ONU and the total energy consumption of the whole network under the premise of guaranteeing packet delay constraints.

    Research on traffic identification and scheduling based on optical interconnection architecture in data center
    Bingli GUO,Ning ZHAO,Zhiwen ZHU,Fan NING,Shanguo HUANG
    2018, 39(9):  122-128.  doi:10.11959/j.issn.1000-436x.2018161
    Asbtract ( 414 )   HTML ( 7)   PDF (920KB) ( 823 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the data center link congestion problem,based on the characteristics of the flow distribution and flow types,a flow identification and scheduling scheme based on optical interconnect structure,named HCFD (host-controller flow detection),was proposed to identify the elephant flow which has a large impact on the network performance,and use the SDN controller to make forward strategy,and schedule the network traffic reasonably.The implementation of the scheme was to use the Netfilter framework in Linux kernel protocol on the host side to mark the flow that exceeds the threshold amount.Then,the classification model was used in the controller side to classify the marked flow.Finally,the appropriate forwarding strategy was developed based on the above results.With the advantage of the photoelectric network,mechanisms of flow depth fusion and switching could be realized.The scheme which integrates the advantage of the existing research results,was expected to identify elephant flow more accurately and comprehensively.It can effectively alleviate the network congestion,make full use of network bandwidth,reduce end-to-end delay and packet loss rate.

    Research on IQ imbalance estimation algorithm based on GSOP
    Xian ZHOU,Tianyu GAO,Jiahao HUO,Xiaojie SHEN,Dongxu LU,Wei HUANGFU,Jiajing TU,Keping LONG
    2018, 39(9):  129-134.  doi:10.11959/j.issn.1000-436x.2018157
    Asbtract ( 801 )   HTML ( 48)   PDF (1008KB) ( 1017 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to satisfy the demand of the efficiency and low cost measurement for high rate optical communication system,the IQ-ImEstimation algorithm was proposed for IQ imbalance estimation in the PDM-MQAM cohernt optical communication system based on GSOP.Two estimation schemes include amplitude impairment and phase impairment were designed by utilizing the power and correlation.Finally,a 34 GBaud PDM-MQAM system was simulated and experimentalized.The results indicate that the IQ-ImEstimation algorithm is accuracy and effective.

    Papers
    High order DPA with profiling
    Zhen WU,Yi WANG,Guanhao ZHOU
    2018, 39(9):  135-146.  doi:10.11959/j.issn.1000-436x.2018164
    Asbtract ( 726 )   HTML ( 37)   PDF (993KB) ( 1081 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In side channel attack,the masking implementation is one of the most popular counter measures again first order DPA.Presently,high order DPA and high order template attack are often used to attack against masking counter measures.High order DPA,however,targets joint leakage of multiple types of information and therefore needs cross combination of powers at corresponding positions,which is the root of the inefficiency of high order DPA.High order template attack,on the other hand,has to know the random mask in each encrypting at its learning phase,which is rarely satisfied for most adversaries.Be aware of these shortcomings and limitations,the algorithm of high order DPA with profiling used neural network to establish the model of fitting the combination of un-masked intermediate values.Attacking was based on the correlation coefficient between the fitted combination intermediate value and the guessing combination intermediate value.This method eliminated the requirement of knowing the masks at the learning phase of template attack and the requirement of cross combination of powers for high order DPA,and therefore lowered the requirement of learning as well as improved attacking efficiency.Experiments have confirmed the feasibility of this algorithm,as well as its efficiency.

    Software behavior trust forecast model based on check point scene information
    Junfeng TIAN,Yuhui GUO
    2018, 39(9):  147-158.  doi:10.11959/j.issn.1000-436x.2018163
    Asbtract ( 302 )   HTML ( 5)   PDF (1047KB) ( 881 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to ensure the trustworthiness of software,and evaluate the trusted status of the software after running for a period of time by monitoring software behavior dynamically,a software behavior trust forecast model on checkpoint scene information which was called CBSI-TM was presented.The model set up a number of checkpoints in the software running track,and introduced the time increment of adjacent checkpoints,and the change of CPU utilization rate to define the scene information,and reflected the relationship between adjacent checkpoints scene information.Then the RBF neural network classifier evaluated the status of the current checkpoint to judge the trustworthiness of the software,and the semi weighted Markov model predicted the situation of the next checkpoint to evaluate the trustworthiness of future running trend of the software.The experimental results show that the CBSI-TM model can predict the future trusted status of the software effectively,and verify that the model is more reasonable and effective.

    Object-based change detection method for high-resolution remote sensing image combining shadow compensation and multi-scale fusion
    Chao WANG,Xuehong ZHANG,Aiye SHI,Dan LI,Yi SHEN
    2018, 39(9):  159-167.  doi:10.11959/j.issn.1000-436x.2018168
    Asbtract ( 475 )   HTML ( 9)   PDF (4523KB) ( 631 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As an interpreting symbol of remote sensing images,shadow,however,brings about “pseudo changes”,which is one of the main sources leading to error detection in high-resolution remote sensing image change detection.For this issue,an object-based high-resolution remote sensing image change detection method was proposed combining with shadow compensation and multi-scale fusion.In the object orientation detection framework,the shadows in the remote sensing images were extracted.Then multi-scale change detection was conducted with shadow compensation.In the process,an objective function was constructed of mutual scale information minimization to realize the adaptive extraction of scale parameters.Based on this,combined with the shadow compensation factor,a multi-scale decision-level fusion strategy built on D-S theory of evidence was designed,and the levels of change intensity were further divided.The experiments show that the method is effective in solving the error detection problem caused by shadow,significantly improving the precision of change detection.

    Analysis and optimal realization of pole-zero sensitivity for FIR digital filters
    Ling ZHUANG,Jingyi MA,Guangyu WANG,Juan GUAN
    2018, 39(9):  168-177.  doi:10.11959/j.issn.1000-436x.2018167
    Asbtract ( 952 )   HTML ( 26)   PDF (1138KB) ( 944 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the deviation of pole and zero in filters which caused by the finite word length (FWL) effects,the sensitivity of pole and zero for FIR digital filters to coefficient errors was studied based on the state-space model.Unlike the IIR filter,the system matrix in state-space model of the FIR filter was defective.A set of generalized eigenvectors of defective matrix was introduced to analyze the pole sensitivity and derive the measure expression,and optimal realizations with respect to pole-zero sensitivity for FIR filters were proposed by finding optimal transformation matrices according to the similarity transformation theory.Theoretical analysis and simulation experiments show that the poles of a FIR filter are more sensitive to coefficient errors,and the proposed optimal realizations can reduce the sensitivity.

    Security analysis of security protocol Swift implementations based on computational model
    Bo MENG,Xudong HE,Jinli ZHANG,Lili YAO,Jintian LU
    2018, 39(9):  178-190.  doi:10.11959/j.issn.1000-436x.2018165
    Asbtract ( 337 )   HTML ( 5)   PDF (860KB) ( 868 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: