Please wait a minute...

Current Issue

    25 January 2019, Volume 40 Issue 1
    Papers
    Blind mask template attacks on masked cryptographic algorithm
    Yi WANG,Zhen WU,Bing LIN
    2019, 40(1):  1-14.  doi:10.11959/j.issn.1000-436x.2019007
    Asbtract ( 607 )   HTML ( 42)   PDF (1138KB) ( 1063 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information.Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase.This requirement not only increase the prerequisite of template attacking,but also lead to some sort of difference between the experimental encryption codes of the profiling device and the codes of commercial cryptographic devices,which might degrade performance in real world attacking.Blind mask template attack directly learns templates for the combination of no mask intermediate values without the need of knowing the masks of training power traces,and then uses these templates to attack masked cryptographic devices.Both traditional Gaussian distribution and neural network were adopted as the templates in experiments.Experimental results verified the feasibility of this new approach.The success rate of neural network based blind mask template attacking against masked cryptographic devices is very close to that of traditional template attacks against cryptographic devices without masking countermeasure.

    Retina-imitation sampling based binary descriptor
    Qingsheng YUAN,Guoqing JIN,Dongming ZHANG,Xiuguo BAO
    2019, 40(1):  15-23.  doi:10.11959/j.issn.1000-436x.2019021
    Asbtract ( 321 )   HTML ( 11)   PDF (3576KB) ( 850 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing binary descriptors,generated from random or uniform point pairs sampling,suffer from low robustness and high computation.A novel sampling method,named RBS (retina-imitation based sampling),was proposed, which combines different densities sampling,multi-scale smoothing and reception field overlapping to imitate the converting from light signal to vision of ganglion cells of human retina cells,and further selects most discriminative comparison pairs based on learning on training data.Finally,compact binary descriptor was generated based on comparisons between the neighbor mean instead of singe sampled point.The experimental results show the RBS-128 with 128 bit outperforms FREAK and BRSIK with 512 bit about 16.4% and 5.3% in precision on the dataset provided by Mikolajczyk.

    HTTP malicious traffic detection method based on hybrid structure deep neural network
    Jia LI,Xiaochun YUN,Shuhao LI,Yongzheng ZHANG,Jiang XIE,Fang FANG
    2019, 40(1):  24-33.  doi:10.11959/j.issn.1000-436x.2019019
    Asbtract ( 795 )   HTML ( 91)   PDF (941KB) ( 1793 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In response to the HTTP malicious traffic detection problem,a preprocessing method based on cutting mechanism and statistical association was proposed to perform statistical information correlation as well as normalization processing of traffic.Then,a hybrid neural network was proposed based on the combination of raw data and empirical feature engineering.It combined convolutional neural network (CNN) and multilayer perceptron (MLP) to process text and statistical information.The effect of the model was significantly improved compared with traditional machine learning algorithms (e.g.,SVM).The F1value reached 99.38% and had a lower time complexity.At the same time,a data set consisting of more than 450 000 malicious traffic and more than 20 million non-malicious traffic was created.In addition,prototype system based on model was designed with detection precision of 98.1%~99.99% and recall rate of 97.2%~99.5%.The application is excellent in real network environment.

    Contention graph based concurrent scheduling algorithm in millimeter wave WPAN
    Yibing WANG,Yong NIU,Weiguang DING,Hao WU
    2019, 40(1):  34-42.  doi:10.11959/j.issn.1000-436x.2019010
    Asbtract ( 373 )   HTML ( 8)   PDF (829KB) ( 739 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The directional antennas and beamforming techniques in millimeter wave (mmWave) bands are used to make concurrent transmission between multiple flows become possible.However,higher mutual interference may be caused by concurrent transmission.Therefore,when the time slots were limited and the number of data flows was large,how to schedule the concurrent flows efficiently was solved by proposed algorithm.The contention graph based spatial-time division multiple access (CB-STDMA) concurrent scheduling algorithm guaranteed the quality of service (QoS) of users,and aimed at maximizing the number of flows with their QoS requirements satisfied.It considered the interference between different flows,and a higher priority was given to the flow with fewer time slots requirement.Extensive simulations demonstrated that the proposed CB-STDMA algorithm increased the number of flows with their QoS requirements satisfied and the network throughput by 50% and 20% respectively compared with the existing algorithms.

    Nonparametric Bayesian dictionary learning algorithm based on structural similarity
    Daoguang DONG,Guosheng RUI,Wenbiao TIAN,Jian KANG,Ge LIU
    2019, 40(1):  43-50.  doi:10.11959/j.issn.1000-436x.2019015
    Asbtract ( 381 )   HTML ( 19)   PDF (1698KB) ( 965 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Though nonparametric Bayesian methods possesses significant superiority with respect to traditional comprehensive dictionary learning methods,there is room for improvement of this method as it needs more consideration over the structural similarity and variability of images.To solve this problem,a nonparametric Bayesian dictionary learning algorithm based on structural similarity was proposed.The algorithm improved the structural representing ability of dictionaries by clustering images according to their non-local structural similarity and introducing block structure into sparse representing of images.Denoising and compressed sensing experiments showed that the proposed algorithm performs better than several current popular unsupervised dictionary learning algorithms.

    Research on video streaming media cooperative downloading in vehicular ad hoc network
    Liang CHEN,Jun WANG,Rong CHEN,Xiang GU,Jin WANG,Jie WAN
    2019, 40(1):  51-63.  doi:10.11959/j.issn.1000-436x.2019018
    Asbtract ( 352 )   HTML ( 14)   PDF (806KB) ( 936 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The same direction multi-hop downloading network flow model was proposed for vehicle communication range and channel competition under forwarding.According to the model and video streaming media characteristic,the same & opposite direction cooperative downloading quality of service (SODCD-QoS) scheme was presented.First,the same direction vehicles helped the target vehicle to achieve multi-hop cooperative downloading.It can reduce the waste of time which the target vehicle has to wait for opposite direction cooperative vehicle.Secondly,the next base stations loaded data into eligible opposite direction vehicles according to vehicles option strategy based on time first or picture quality first.Then the opposite direction vehicles helped the target vehicle to achieve one-hop cooperative downloading.NS simulations show that the SODCD-QoS scheme is better than DSRelay and VCoDS algorithm in terms of download time.Further,the new scheme can maintain good picture quality PSNR.

    Service function chain construct algorithm based on reliability
    Julong LAN,Zijin JIN,Penghao SUN,Yiming JIANG,Yue WANG
    2019, 40(1):  64-70.  doi:10.11959/j.issn.1000-436x.2019003
    Asbtract ( 343 )   HTML ( 28)   PDF (758KB) ( 990 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the continuous expansion of network size and content quantity,network operators often face the problem of data transmission interruption,thus how to improve the reliability of data transmission has become a research hotspot.Started with the huge advantages of NFV environment over traditional TCP/IP architecture based on the background that every network node has the capability of security service,a reliability algorithm for constructing functional service chains was proposed.First,the network topology was introduced and abstracted it into a digraph for a better analyzation.Then,several quantitative indices were used to define the upper and lower bounds of failure probability and resolved the model through a heuristic algorithm.The experimental results show that the proposed algorithm increases the reliability of service chain selection and spends less time.

    Coverage control algorithm for wireless sensor networks based on non-cooperative game
    Haoran LIU,Heyao ZHAO,Yujing DENG,Xingqi WANG,Rongrong YIN
    2019, 40(1):  71-78.  doi:10.11959/j.issn.1000-436x.2019006
    Asbtract ( 362 )   HTML ( 12)   PDF (873KB) ( 836 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the redundancy coverage of nodes leads to the phenomenon of low energy efficiency,Non-cooperative game theory was used to solve it.A revenue function was proposed,which considering the coverage of nodes and the residual energy.The lifetime of the node and network path gain were applied to revenue function.The network topology was built by nodes with the appropriate work strategy.Control algorithm coverage in wireless sensor network was proposed based on Non-cooperative game theory.A Nash equilibrium between the coverage rate and the residual energy was proved,and the return function converged to the Pareto optimal.Experiments show that the algorithm can provide reasonable coverage of network nodes and ensure energy efficiency.

    Low complexity codebook search method in massive MIMO system
    Jianfei LIU,Liping HE,Ying TAO,Di LIU,Xiangye ZENG,Mengjun WANG
    2019, 40(1):  79-86.  doi:10.11959/j.issn.1000-436x.2019009
    Asbtract ( 518 )   HTML ( 34)   PDF (1023KB) ( 1346 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In Massive MIMO systems for 5G networks,precoding technology is one of the key technologies.Aiming at user side codebook search method of the discrete Fourier transform (DFT) rotation codebook,a low complexity search algorithm was proposed.In this algorithm,all horizontal and vertical codebooks were grouped separately according to the characteristics that the precoding vectors with the same column of DFT rotation codebooks had the smallest chordal distance and the smaller chordal distance have the stronger correlation,and then the optimal horizontal and vertical codewords with maximum channel gain were obtained to form 3D precoding code-books.The simulation results indicate that the searching complexity of the proposed method is significantly reduced under conditions of insuring the system performance,moreover,this advantage becomes greater with the number of antennas increasing.

    Research on Cloudlet selection strategy for data streaming applications in mobile cloud environment
    Wei LIU,Shu XIONG,Wei DU,Wei WANG
    2019, 40(1):  87-101.  doi:10.11959/j.issn.1000-436x.2019020
    Asbtract ( 298 )   HTML ( 15)   PDF (1156KB) ( 911 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Most existing Cloudlet selection strategies only used the resources of one Cloudlet to compute offloading,which couldn’t obtain the superior performance improvement for mobile data streaming application with many parallel components.To address this issue,a Cloudlet selection strategy based on chemical reaction optimization algorithm was proposed.The strategy aims to reduce application’s completion time and energy consumption of mobile device.When the dependencies among application’s components was satisfied,the strategy can take full advantage of the computing capability of multi-cloudlet to execute the parallel components of mobile data stream application simultaneously.Therefore the strategy can improve the execution efficiency and reduce the energy consumption of mobile device.The simulation results reveal that the proposed strategy can achieves 18.3% on average performance improvement than POCSS strategy does in multi-Cloudlet environment.

    Reverberation multi-source localization algorithm based on compressed sensing with dual microphones
    Yi ZHANG,Juan LI,Min ZHANG
    2019, 40(1):  102-109.  doi:10.11959/j.issn.1000-436x.2019011
    Asbtract ( 507 )   HTML ( 28)   PDF (840KB) ( 929 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In traditional multi-source localization field,it is necessary to guarantee that the number of microphone is more than the number of source.To overcome this constraint,a dual-microphone multi-source localization algorithm based on CS was proposed,where the number of sound source localized successfully was more than 3.The multi-source localization was regarded as the block sparse signal reconstruction in this algorithm,and the full room impulse responses normalized were exploited to construct the compressed observation matrix in frequency domain.In reconstructed block sparse signal,the positions of non-zero blocks were corresponded to the positions of sound sources in space.The simulation shows that compared with the SRP-sub algorithm,in reverberation time 0.6s with dual-microphone,the proposed multi-source localization algorithm based on compressed sensing has higher capability which can reach 80% success rate by using 40 frequency points to localize 3 sound sources.

    Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver
    Wei WANG,Xinrui LI,Liuguo YIN,Guoan ZHANG,Shibing ZHANG
    2019, 40(1):  110-118.  doi:10.11959/j.issn.1000-436x.2019016
    Asbtract ( 258 )   HTML ( 10)   PDF (884KB) ( 693 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.

    Surface sliding mode controller for chaotic oscillation in power system with power disturbance
    Fuhong MIN,Hanyuan MA,Yaoda WANG
    2019, 40(1):  119-129.  doi:10.11959/j.issn.1000-436x.2019005
    Asbtract ( 245 )   HTML ( 6)   PDF (2260KB) ( 862 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of the power industry,the possibility of chaotic oscillation increases in the power system,and the importance of maintaining the stability of the power system is prominent.Through a fourth-order power system model with power perturbation term built,the Lyapunov exponent spectrum,bifurcation diagram and spectral entropy were analyzed,respectively.The influence of power disturbance terms on power system motion was discussed in detail.Moreover,a dynamic surface sliding mode controller was designed based on the switching function with relay characteristics.Simulation results show that the controller can suppress the chaotic oscillation quickly and smoothly,and effectively avoid chattering and own strong robustness.

    Cloud data assured deletion scheme based on overwrite verification
    Ruizhong DU,Pengliang SHI,Xinfeng HE
    2019, 40(1):  130-140.  doi:10.11959/j.issn.1000-436x.2019012
    Asbtract ( 409 )   HTML ( 16)   PDF (825KB) ( 895 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At the end of data life cycle,there is still a risk of data leakage,because mostly data which was stored in cloud is removed by logical deletion of the key.Therefore,a cloud data assured deletion scheme (WV-CP-ABE) based on ciphertext re-encrypt and overwrite verification was proposed.When data owner wants to delete the outsourced data,the data fine-grained deletion operation was realized by re-encrypting the ciphertext to change the access control policy.Secondly,a searchable path hash binary tree (DSMHT) based on dirty data block overwrite was built to verify the correctness of the data to be deletion.Finally,the dual mechanism of changing the ciphertext access control policy and data overwriting guarantees the data assured deletion.The experimental analysis proves that the fine-grained control is better and the security is more reliable than the previous logical delete method in the assured deletion of data.

    Comprehensive Reviews
    Technology prospect of 6G mobile communications
    Ping ZHANG, Kai NIU, Hui TIAN, Gaofeng NIE, Xiaoqi QIN, Qi QI, Jiao ZHANG
    2019, 40(1):  141-148.  doi:10.11959/j.issn.1000-436x.2019022
    Asbtract ( 2083 )   HTML ( 440)   PDF(2467KB) ( 3597 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To achieve a deeper level of intelligent communication for human beings,the sixth generation mobile communication system (6G) will realize the extension from the real world to the virtual world.To this end,the “human-machine-thing-genie” problem introduced by 6G was presented,and an evolved dual-world architecture for 6G was proposed.The architecture includes the fourth elements of 6G,genie,in the virtual world.The potential key theories and technologies to support the design and implementation of 6G were proposed and analyzed.

    Research status of community detection based on local expansion
    Yancui SHI,Yuan WANG,Qing ZHAO,Xiankun ZHANG
    2019, 40(1):  149-162.  doi:10.11959/j.issn.1000-436x.2019013
    Asbtract ( 346 )   HTML ( 26)   PDF (758KB) ( 1598 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Community detection can effectively mine the characteristics of the network as well as the hidden information.Local expansion is a commonly used method of community detection,and it can be divided into two steps:the selection of seeds and the local expansion.Therefore,in order to analyze the advantages and disadvantages of the existing methods and their application,these methods about the selection of seeds,local expansion and evaluation were summarized,compared and analyzed.Then,the application and the research difficulties of community detection based on local extension were summarized.Finally,the research directions of community detection based on local expansion were given.

    Correspondences
    Weakly supervised semantic segmentation and optimization algorithm based on multi-scale feature model
    Changzhen XIONG,Hui ZHI
    2019, 40(1):  163-171.  doi:10.11959/j.issn.1000-436x.2019004
    Asbtract ( 488 )   HTML ( 27)   PDF (1248KB) ( 1305 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the accuracy of weakly-supervised semantic segmentation method,a segmentation and optimization algorithm that combines multi-scale feature was proposed.The new algorithm firstly constructs a multi-scale feature model based on transfer learning algorithm.In addition,a new classifier was introduced for category prediction to reduce the failure of segmentation due to the prediction of target class information errors.Then the designed multi-scale model was fused with the original transfer learning model by different weights to enhance the generalization performance of the model.Finally,the predictions class credibility was added to adjust the credibility of the corresponding class of pixels in the segmentation map,avoiding false positive segmentation regions.The proposed algorithm was tested on the challenging VOC 2012 dataset,the mean intersection-over-union is 58.8% on validation dataset and 57.5% on test dataset.It outperforms the original transfer-learning algorithm by 12.9% and 12.3%.And it performs favorably against other segmentation methods using weakly-supervised information based on category labels as well.

    Fast and resource efficient method for indoor localization based on fingerprint with varied scales
    Yanfen LE,Zhuo TANG,Cunbao SHENG,Weibin SHI
    2019, 40(1):  172-179.  doi:10.11959/j.issn.1000-436x.2019001
    Asbtract ( 309 )   HTML ( 27)   PDF (734KB) ( 829 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve the prediction speed in indoor localization,a novel algorithm based on fingerprint with varied scales was proposed.It divided the region of interest into distinct zones with distinctive coverage indicators,and reference positions with different distribution density were set in the region.According the time relevance and strength vary of the RSS from the anchors,the grids-matching process was greatly sped up for the usage of coverage indictors and the features of the location fingerprint extracted with the PCA,which made the proposed method fit the demand of application with limited power and memory.Experimental results indicate that accuracy of the positioning is ensured with the reduced energy-consuming,and more flexible about the number of anchors and the grid distribution.

    C3S:research of CI-based concurrent transmission strategy for intelligent sensing system
    Yanyan MAO,Dapeng CHENG,Yanli FENG,Quansheng DOU,Dashe LI
    2019, 40(1):  180-194.  doi:10.11959/j.issn.1000-436x.2019017
    Asbtract ( 350 )   HTML ( 5)   PDF (1797KB) ( 878 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Concurrent transmission technology has important sense for Intelligent Sensing System (ISS).The C3S strategy based with constructive interference (CI) was proposed.C3S was composed of intelligent clock synchronization layer,intelligent energy consumption allocation layer and intelligent parallel pipeline layer.The intelligent clock synchronization layer designed ICCA,a CI-based intelligent clock calibration algorithm.The intelligent energy allocation layer designed CIES,a energy adaptive scheduling scheme for CI,Moreover,a CI-based parallel pipeline CI2P was implemented in the intelligent parallel pipeline layer.The experimental results show that the C3S strategy can effectively improve the packet receiving rate of the concurrent transmission in ISS.It can also reduce the energy consumption of ISS and improve the channel utilization rate of ISS.

    Research on the algorithm for reducing the PAPR of OFDM system based on quantum chaotic mapping
    Yingjie MA,Geng ZHAO,Zhanzhen WEI,Zhaobin LI,Lei JU
    2019, 40(1):  195-200.  doi:10.11959/j.issn.1000-436x.2019008
    Asbtract ( 319 )   HTML ( 15)   PDF (1259KB) ( 934 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the high peak to average power ratio (PAPR) problem of OFDM system,a modified selective mapping algorithm based on quantum loigstic chaotic map was proposed.To solve the problem of fixed point and stable window,the quantum loigstic chaotic maps were used as random phase sequence vectors,which provided a large number signals with fine correlation and random characteristics,easy to produce and regenerate.Matlab simulation results show that the proposed algorithm effectively reduces the PAPR,increases the numbers of candidate signals,cuts down the amount of redundant information transmission,bring down the side band power.The proposed scheme has a broad application prospect in OFDM system.

    Boolean-chaos-based physical random number generator
    Qiqi ZHANG,Jianguo ZHANG,Pu LI,Yanqiang GUO,Yuncai WANG
    2019, 40(1):  201-206.  doi:10.11959/j.issn.1000-436x.2019014
    Asbtract ( 379 )   HTML ( 14)   PDF (1063KB) ( 1225 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel method for generating physical random numbers using Boolean-chaos as the entropy source was proposed.An autonomous Boolean network (ABN) without self-feedback was constructed by using two-input logic gates,and its dynamic characteristics were analyzed.Based on this,a 15-node ABN circuit was implemented to successfully generate Boolean-chaos with a bandwidth of ~680 MHz and a min-entropy around 1.By implementing the entropy source and the entropy extraction circuit on a single FPGA,the physical random number generation with a real-time rate of 100 Mbit/s was finally achieved.The NIST SP800-22 and DIEHARD randomness test results demonstrate that the obtained random sequences by the method successfully pass all tests.This indicates the random numbers has good random statistical characteristics.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: