Please wait a minute...

Current Issue

    20 August 2023, Volume 39 Issue 8
    Review
    Review on unmanned aerial vehicle covert communication network
    Hengzhi BAI, Haichao WANG, Guoxin LI, Yuping GONG
    2023, 39(8):  1-16.  doi:10.11959/j.issn.1000-0801.2023162
    Asbtract ( 130 )   HTML ( 35)   PDF (2715KB) ( 370 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Unmanned aerial vehicle (UAV) communication network is an important part of the future integrated space-aerial-ground network, and an effective support to achieve the global three-dimensional coverage of the communication network.The open characteristics of wireless channels make UAV communication vulnerable to malicious attacks by illegal users.Covert communication provides a promising solution for improving the security defense and privacy protection capabilities of UAV communication.However, the overlapping characteristics of the mobility of UAV systems and the requirements of covert communication scenarios bring severe challenges to the collaborative optimization of network resources.The UAV covert communication network was investigated from requirements, challenges, framework and main technologies perspectives.The architecture and model, performance characteristic, as well as potential candidate technologies were analyzed and discussed, in an attempt to outline the overall framework of UAV covert communication, and provide guidance for the subsequent research on UAV covert communication.

    Research and Development
    Multi-satellite cooperative beam hopping resource allocation based on interference perception
    Jinlong HU, Jihong LIU, Yiqing ZHOU, Huan CAO, Zifan LIU, Jiawei ZHAO, Jinhong YUAN
    2023, 39(8):  17-28.  doi:10.11959/j.issn.1000-0801.2023161
    Asbtract ( 114 )   HTML ( 28)   PDF (3141KB) ( 247 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Beam hopping (BH) is a crucial technology in the low earth orbit (LEO) satellite system with limited beams number and uneven transmission requirements.However, the existing research only considers the resource allocation of a single LEO satellite, that is, the resource allocation scheme in which one satellite serves one ground area.However, the actual LEO satellite coverage is simultaneously covered by multiple satellites in multiple orbits.Existing schemes only consider the resource allocation of a single satellite, which will cause beam interference between satellites, resulting in a decrease in communication quality and throughput.In response to the above problems, an interference aware cooperative resource allocation scheme for LEO with beam hopping (IARA-BH) was proposed.The basic idea of IARA-BH was to improve the interference distribution and throughput of multi-satellite networks under the constraint of guaranteeing user requirements by coordinating beam interference between satellites.The experiment results show that compared with the single-satellite beam hopping resource scheduling scheme, the multi-satellite cooperative beam hopping resource scheduling scheme can improve the average signal to interference ratio (SIR) by 15.52%, and the system throughput can be increased by 5.72%.

    A survey on redundancy mechanisms in time-sensitive networking
    Zimei PENG, Guochu SHOU, Mengjie GUO, Yaqiong LIU, Yihong HU
    2023, 39(8):  29-42.  doi:10.11959/j.issn.1000-0801.2023159
    Asbtract ( 130 )   HTML ( 34)   PDF (1651KB) ( 154 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Many network applications, such as industrial control and automatic driving, have high requirements for network reliability.Time-sensitive networking (TSN) is a new generation of network technology based on the evolution of standard Ethernet architecture, including the frame replication and elimination for reliability (FRER).Firstly, the redundancy mechanism in TSN standard was described, including the development process, relevant standards and research status.Secondly, the spatial redundancy and time redundancy mechanisms in TSN were classified and analyzed.Finally, the future development and application scenarios of the redundancy mechanism in TSN were prospected, and some inspiring research directions and ideas were put forward.

    Research on 5G MEC security assessment system and method
    Qiucheng LU, Jinhui TANG, Congying BAO, Hao WU, Yusun FU
    2023, 39(8):  43-57.  doi:10.11959/j.issn.1000-0801.2023152
    Asbtract ( 93 )   HTML ( 20)   PDF (1451KB) ( 96 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.

    A social media geolocation method based on comparative learning
    Yongchang XU, Shiduo HUANG, Haojun AI
    2023, 39(8):  58-68.  doi:10.11959/j.issn.1000-0801.2023154
    Asbtract ( 93 )   HTML ( 24)   PDF (2154KB) ( 238 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Previous work on social media text-based geolocation focused on mapping language semantic space to geospatial space, which ignores the semantic correlation between social media texts and the distance correlation between geographical locations.To take advantage of these correlations, mCLF, a new unsupervised multiple-level contrastive learning framework was proposed, three contrastive learning modules were designed: a semantic learning module, a location learning module, and a cross-learning module.Transformer encoder was used to obtain semantic representation of posts, utilizing unsupervised contrastive learning method to decrease the distance of semantic representations and location representations of posts with near locations, and then fine-tuned the model with supervised method for geographic location regression or classification outputs.Compared with five baseline methods, extensive experiments based on four datasets demonstrate the effectiveness of the proposed framework.

    UAV service enhancement mechanism deep deterministic policy gradient for scalable video coding transmission
    Junjie YAN, Yaxin ZHU, Yanru FENG, Hanyong LIU, Junyi DENG, Huan WANG
    2023, 39(8):  69-81.  doi:10.11959/j.issn.1000-0801.2023158
    Asbtract ( 54 )   HTML ( 5)   PDF (4409KB) ( 213 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Unmanned aerial vehicles (UAV) are an important component of future air-space-ground integrated network due to their onboard storage, communication, and computing capabilities.However, existing research on UAV-assisted edge networks often focuses more on the network perspective and lacks consideration of user perspectives and their requirements.Therefore, a UAV service enhancement mechanism based on deep deterministic policy gradient (DDPG) for scalable video coding (SVC) transmission was proposed from the user’s perspective.Firstly, an elastic video transmission method based on SVC was proposed in conjunction with UAV to improve differentiated user experiences.Secondly, a UAV trajectory planning design based on the DDPG algorithm was proposed to maximize the number of users receiving enhanced layer videos and ensure effective coverage enhancement by UAV in hotspot areas.Simulation results show that compared with both the deep Q network (DQN) algorithm and shortest path (SP) algorithm under different user distributions, the proposed algorithm can increase the average number of enhanced layers received by 47.9% and 76.4%, respectively.This study successfully achieves improved coverage in hotspot areas while also providing differentiated user experiences through its proposed methods.

    Mobile network scheduling and operation information sharing method based on chaos reverse learning improved grey wolf algorithm
    Xinyue YU, Yipu ZHANG, Yong ZHANG, Lin YANG, Weidong GAO, Yan GUO
    2023, 39(8):  82-90.  doi:10.11959/j.issn.1000-0801.2023164
    Asbtract ( 45 )   HTML ( 8)   PDF (1302KB) ( 43 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the effectiveness of mobile network scheduling operation information, a method of mobile network scheduling operation information sharing based on chaos reverse learning improved gray wolf algorithm was proposed.On the basis of studying the information sharing structure between the information intranet/provincial dispatching demilitarized zone (DMZ) and the network/provincial dispatching III area, the information sharing was realized through a three-layer scheduling network model including the sharing task layer, the information layer and the user layer, and the information scheduling optimization objective function to maximize the information utility was determined, and the information scheduling results were obtained by solving the objective function through the grey wolf algorithm.In order to obtain better solution results of the objective function, chaos reverse learning and information sharing search strategy were introduced to optimize the initial population and communication ability of the grey wolf algorithm, so as to obtain better solution results and realize the optimal information sharing.The test results show that the method has good application performance.The information utility values are all above 20, the deviation rate is lower than 0.12, and the goodness of fit is higher than 0.92.It can complete information sharing under different transmission modes and present the details of shared information.

    Research on the graphical convolution neural network based benefits recommendation system strategy
    Tao TAO, Zhen LI, Jibin WANG, Haiyong XU, Yong JIANG, Zhuo CEHN, Runbo ZHANG, Qingyuan HU
    2023, 39(8):  91-101.  doi:10.11959/j.issn.1000-0801.2023155
    Asbtract ( 105 )   HTML ( 25)   PDF (2430KB) ( 89 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The recommendation system is one of the important methods to realize the intelligent recommendation of massive Internet benefit products.In order to improve the accuracy of personalized benefits recommendation, a deep learning recommendation system based on graph computing method was proposed.Considering the heterogeneity of multi-source data, a graph representation technology based on deep learning was carried out to construct the multiple relationship graph between users and benefit products.The multiple relationship graph extracted the information of graph structure, and model the heterogeneous graphs for the multi-dimensional features of users and the multiple interaction modes between rights and interests products, which effectively aggregated various interactive information and the multiple feature.A heterogeneous graph convolutional neural network was built to learn the high-dimensional feature vectors for various nodes, and excavate users' latent preferences to provide a recommendation link with strong interpretability, which greatly improved the recommendation success rate and generating economic value.

    An adaptive unscented Kalman filter algorithm for electronic archives information data denoising
    Ting ZHOU
    2023, 39(8):  102-108.  doi:10.11959/j.issn.1000-0801.2023151
    Asbtract ( 31 )   HTML ( 3)   PDF (926KB) ( 44 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The adaptive unscented Kalman filter noise reduction algorithm for electronic archives information data was studied to address the issue of data loss during the noise reduction process, as well as the noise covariance and initial value deviation of the data after gross errors.The architecture of electronic archives informatization consisted of the data, business, and user layers.In the data layer, the electronic archives informatization data underwent pretreatment, decision-making, monitoring, and analysis based on user data requests from the user layer.Assumptions were made on the electronic archives informatization data using the Laida criterion to determine the standard deviation probability and establish intervals.Gross errors were eliminated and the noise covariance of the data after gross error removal was estimated using the Sage-Husa filter.This helped to suppress the deviation of the initial value and preserve the original data as much as possible.The traceless Kalman algorithm was utilized to estimate the unknown noise characteristics of electronic archives informatization data in real-time, enabling the noise reduction of electronic archives informatization data.The virtual induction service connected the data, users, and business layer, facilitating the presentation of the required electronic archives information to users in the business layer.Experimental results demonstrate that the algorithm effectively removes various noises from electronic archives information data while retaining the valid data.

    mmWave radar based robust sign language recognition for the smart museum
    Xuerong ZHAO, Xuan WANG, Tong LIU, Xia ZHENG, Yicheng JIANG
    2023, 39(8):  109-117.  doi:10.11959/j.issn.1000-0801.2023144
    Asbtract ( 73 )   HTML ( 9)   PDF (2372KB) ( 186 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A smart museum is a new form of a museum, which uses devices or technologies including the Internet of things (IoT) and artificial intelligence (AI) to build the information interaction channels between people, things, and space.Sign language recognition not only assists the visitors who have hearing or speech impairment to visit the museum without barriers but also helps study the visitors’ natural gesture interaction.However, the methods based on cameras and wearable devices mayhave issues like privacy or usability when applied to museum spaces.Therefore, a robust sign language recognition method based on millimeter-wave radar was proposed.Different features of distance and velocity changes relative to the radar device were firstly extracted in this method, then a physical data enhancement method was adopted to expand the training data.Finally, a ResNet based on the pre-processed distance time features and Doppler time features was designed to further remove the environment-related information and perform feature fusion for classification.Experimental results show that this method can effectively recognize sign language and achieve an averaged recognition accuracy of over 90% when the testing environment and the user's location change, providing a new method for smart museum wireless sign language and gesture recognition.

    Multi-scale outlier mining algorithm for stateless communication data under IPv6 remote monitoring network
    Kun LIU, Xiaohan ZHANG, Rukun CAO, Shuai LI
    2023, 39(8):  118-126.  doi:10.11959/j.issn.1000-0801.2023149
    Asbtract ( 45 )   HTML ( 7)   PDF (1910KB) ( 63 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to accurately mine outliers and reduce the impact of outliers on communication data, a multi-scale outlier mining algorithm for stateless communication data in IPv6 remote monitoring network was investigated.The stateless communication data were obtained through an IPv6 remote monitoring network, and based on the seasonality, trend, and self-similarity characteristics of the extracted stateless communication data, the Fourier transform was used to divide the stateless communication data into two classes.Then, the K-mean method was used to cluster the two classes to determine the neighborhood of the stateless communication data, which was used as the basis for outlier mining using a convolutional neural network on the stateless communication data.The convolutional neural network was initialized, and according to the output value of the convolutional neural network, it was determined whether the network met the stopping condition.The operation steps of the convolutional neural network were repeated, all the outlier points were mined, and the multi-scale outlier mining of stateless communication data was achieved.The experimental results showed that the fewer the number of stateless communication data categories, the higher the mining efficiency; the proposed method can accurately mine the number of multiscale outliers of stateless communication data in IPv6 remote monitoring network and accurately analyze the reasons for the outliers.

    Topic: Computing Power Network
    Computing native network (CNN) technology and application driven by joint communication & computing (JC&C)
    Jie SUN, Leiming MA, Aidong YANG, Xiaozhou YE, Peng LYU, Zhigang WANG, Ye OUYANG
    2023, 39(8):  127-135.  doi:10.11959/j.issn.1000-0801.2023153
    Asbtract ( 113 )   HTML ( 20)   PDF (3366KB) ( 134 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The global telecom industry is carrying out research and exploration of potential 6G technical architectures and key techs, of which it has become a consensus in the industry to further realize the vision of 6G smart inclusion by better enabling all new 6G network technologies and services through joint communication & computing (JC&C).Therefore, how to realize the deep integration and real-time collaboration of communication and computing to meet the needs of ultra-low latency and real-time response of new services in dynamic and complex network environments has become the challenge and key of JC&C.A computing native network (CNN) driven by JC&C was proposed, which realized the decoupling of communication and computing of base station or multiple base stations, computing pooling and intelligent JC&C scheduling through computing time division multiplexing and intelligent JC&C scheduling, thus realizing the base station to support communication and computation services simultaneously.The technology has been technically verified and piloted, and the experimental and pilot results demonstrate that CNN can effectively improve the computing utilization rate of wireless networks and realize the base station to support communication and computing services simultaneously, facilitating the evolution of 6G JC&C.

    Research on constrained policy reinforcement learning based multi-objective optimization of computing power network
    Linjiang SHEN, Chang CAO, Chao CUI, Yan ZHANG
    2023, 39(8):  136-148.  doi:10.11959/j.issn.1000-0801.2023165
    Asbtract ( 100 )   HTML ( 24)   PDF (4683KB) ( 123 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The computing power network needs to maximize the system performance index on the basis of meeting user business needs, and the existing methods are mainly based on the multi-objective weighting method, which has problems such as difficult to determine hyperparameters and poor cross-scenario applicability.Based on this, based on the analysis of the characteristics of the computing power network target, the user business requirements were taken as the policy constraints, and the performance indicators of the computing power network was taken as the optimization goal based on constrained policy optimization, and the expectation certainty of user business needs and the optimization of system performance through the value-strategy-hyper-parameter multi-level iterative strategy was realized.At the same time, the multi-scale step length (MSL) method for hyper-parameter optimization was studied, which further improved the stability and accuracy of the system.Simulation results show that the proposed method has good convergence and stability under the conditions of single terminal-single edge server, multi-terminal-multi-edge server and system load change.

    Research on routing scheduling technology of computing power network
    Ran PANG, Xinxin YI, Liang XIN, Chang CAO, Xiongyan TANG
    2023, 39(8):  149-156.  doi:10.11959/j.issn.1000-0801.2023163
    Asbtract ( 231 )   HTML ( 62)   PDF (1611KB) ( 346 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the needs of high-quality development of the digital economy, the research on computing power network is accelerating.How to realize the integrated scheduling of computing resources and network resources becomes the primary challenge for computing power network.The evolution of computing power network was introduced, the resource awaring and routing scheduling technology of computing power network were analyzed, and a hybrid routing scheduling solution for computing power network was proposed to realize the ability of flexible on-demand, fast routing and easy implementation.The implementation process of the hybrid routing scheduling solution in the remote driving scenario of the Internet of vehicles was introduced, which supported the provision of differentiated services integrating computing and networking and fast tuning when the vehicle was moving.

    Research on the security of national secret algorithm based compute first networking
    Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU
    2023, 39(8):  157-166.  doi:10.11959/j.issn.1000-0801.2023160
    Asbtract ( 132 )   HTML ( 33)   PDF (969KB) ( 282 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: