Editors Recommend
25 June 2024, Volume 45 Issue 6
Technologies of Industrial Internet Security
Survey on industrial control protocol security research
Tao HUANG, Zhiwei WANG, Jiachi LIU, Qianxi LONG, Boyu KUANG, Anmin FU, Yuqing ZHANG
2024, 45(6):  60-74.  doi:10.11959/j.issn.1000-436x.2024104
Asbtract ( 70 )   HTML ( 21)   PDF (1574KB) ( 58 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities. Considering the ICS architecture and the developmental characteristics of industrial control protocols, the various vulnerabilities and attack threats commonly faced by industrial control protocols were systematically summarized. At the same time, for the unknown potential vulnerabilities of industrial control protocols, the vulnerability mining techniques of industrial control protocols were analyzed in-depth, including the static symbolic execution-based, code audit-based, and fuzzing-based. The protocol design security protection technology was comprehensively dissected from the three directions of industrial control protocol specification design, communication mechanism, and third-party middleware. In addition, the future development trend of industrial control protocol security was further prospected from the aspects of sandbox development, security protection, and vulnerability mining.

Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Fanyi ZENG, Dapeng MAN, Chen XU, Shuai HAN, Huanran WANG, Xue ZHOU, Xinchun LI, Wu YANG
2024, 45(6):  75-86.  doi:10.11959/j.issn.1000-436x.2024093
Asbtract ( 69 )   HTML ( 14)   PDF (1470KB) ( 53 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at the problem of traffic data distribution shift caused by new unknown attacks in the industrial Internet, a malicious traffic identification method based on neighborhood filtering and stable learning was proposed to enhance the effectiveness and robustness of the existing graph neural network model in identifying known malicious traffic. Firstly, the graph structure of the traffic data was modeled to capture the topological relationship and interaction mode in communication behavior. Secondly, the traffic subgraph was divided based on the neighborhood filtering mechanism of biased sampling to eliminate the pseudo-homogeneity between communication behaviors. Finally, the statistical independence of high-dimensional traffic features was realized by applying graph representation learning and stable learning strategies, combined with adaptive sample weighting and collaborative loss optimization methods. The experimental results on two benchmark datasets show that compared with the baseline method, the recognition performance of the proposed method is increased by more than 2.7% in the new unknown attack scenario, which shows its high efficiency and practicability in the industrial Internet environment.

Research on industrial Internet security detection and response based on digital twin
Jiali MA, Yuanbo GUO, Chen FANG, Qingli CHEN, Qi ZHANG
2024, 45(6):  87-100.  doi:10.11959/j.issn.1000-436x.2024091
Asbtract ( 62 )   HTML ( 20)   PDF (2017KB) ( 48 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Considering that traditional network security defense methods cannot meet the strict requirements of industrial Internet for reliability and stability, a method for anomaly detection and response in digital space was studied based on the idea of digital twins by collecting on-site data and using twin model security cognition. Firstly, four types of modeling methods were summarized and integrated into the multi module digital twin (DT) architecture by analyzing the digital twin modeling solutions. Secondly, the cognition of different twin models was transformed into a standard signal temporal logic (STL) specification set by introducing signal temporal logic technology, and anomaly detection was achieved by monitoring system behavior based on the specification set, by the reliability of detection results was increased. Finally, anomaly localization was achieved through the analysis of violations of the STL specification set, and corresponding STL weak specifications were designed through the analysis of known device faults to achieve anomaly classification. Two aspects of response to anomalies were beneficial for helping the system restore normal operation. The case study demonstrates that the effectiveness of the proposed method in anomaly detection and response. Comparing the proposed method with the intrusion detection system based on deep learning, the experimental results show that the detection rate of the proposed method increases by 25%~40.9% in detecting anomalies.

Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Lu ZHENG, Tao FENG, Chunhua SU
2024, 45(6):  101-116.  doi:10.11959/j.issn.1000-436x.2024121
Asbtract ( 46 )   HTML ( 8)   PDF (2973KB) ( 51 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To address the shortcomings of existing authentication schemes in vehicle networks, which commonly suffer from key escrow issues, as well as the lack of consideration for lightweight deployment and secure rapid authentication of compute-constrained electronic control unit (ECU), a lightweight certificateless anonymous authentication and key agreement scheme without bilinear pairings was proposed for compute-unconstrained ECU networks. The authentication key pair was securely constructed by elliptic curve cryptography, anonymous authentication and key agreement were realized by lightweight methods such as hash functions and XOR operation. Additionally, a certificateless batch verification scheme was proposed to reduce the authentication costs for compute-constrained ECU networks. Finally, a security verification method based on the colored Petri net (CPN) and Dolev-Yao attacker model was proposed to evaluate the formal security of the proposed scheme. The proposed scheme is proved through security evaluation and performance analysis to effectively resist various types of attacks such as replay, spoofing, tampering, known key, known specific session temporary information attack, etc., with multiple security attributes, small computation and communication cost.

Game-based detection method of broken access control vulnerabilities in Web application
Haitao HE, Ke XU, Shuailin YANG, Bing ZHANG, Yuxuan ZHAO, Jiazheng LI
2024, 45(6):  117-130.  doi:10.11959/j.issn.1000-436x.2024078
Asbtract ( 33 )   HTML ( 10)   PDF (2413KB) ( 40 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. The vulnerabilities were identified by analyzing the game results of different participants on resource pages in the Web application, so that the access logic of different users could be targeted to obtain. Experimental results demonstrate that the proposed method successfully detect 31 vulnerabilities, including 8 unreported ones, out of 11 open-source applications, with a detection range exceeding 90%.

Papers
Dual-verified secure localization method for unmanned intelligent vehicles
Xiaodan GU, Guozheng XIA, Bingchen SONG, Ming YANG, Junzhou LUO
2024, 45(6):  131-143.  doi:10.11959/j.issn.1000-436x.2024038
Asbtract ( 41 )   HTML ( 14)   PDF (1926KB) ( 34 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Unmanned intelligent vehicles are exposed to high risks of network attack, hardware attack, operating system attack and software attack. They are susceptible to physical or remote security attacks, causing it to deviate from the delivery trajectory and fail the delivery task, or even be manipulated to disrupt normal operation of the factory. To address this problem, a dual-verified secure localization method for unmanned intelligent vehicles was proposed. The existing Wi-Fi network infrastructure was utilized by the vehicles for fingerprinting localization and a feature fusion strategy was designed to realize the dynamic fusion of Wi-Fi and magnetic field fingerprints. Multiple environmental monitoring points were deployed to collect the sound signals made by vehicles to calculate the position based on time difference of arrival and spatial segmentation method. Then the location reported by the vehicle was compared with the result of monitoring points for verification. Once an abnormal position was detected, an alert would be issued, ensuring the normal operation of the unmanned intelligent vehicles. The experimental results in the real indoor scenarios show that the proposed method can effectively track the positions of the target unmanned intelligent vehicle, and the positioning accuracy is better than existing benchmark algorithms.

AoI-aware task scheduling in edge-assisted real-time applications
Hongyan WANG, Qibo SUN, Xiao MA, Ao ZHOU, Shangguang WANG
2024, 45(6):  144-159.  doi:10.11959/j.issn.1000-436x.2024109
Asbtract ( 45 )   HTML ( 8)   PDF (2008KB) ( 46 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To address the issue where the resource limitations of wireless devices caused state extraction delays that cannot meet the freshness requirements of real-time applications, considering the limited processing capacity of edge nodes, a scheduling method that jointly considered information freshness and real-time performance was proposed. This method initially characterized the task delay before computation and the information freshness after computation by utilizing the system time of the queue and the age of information, respectively. Simultaneously, reasonable deadlines were assigned to each offloaded task to ensure their validity before entering the computation process. Then, the minimum processing rate constraint method was employed to restrict the processing rate during task scheduling, thereby ensuring the real-time nature of task scheduling. Finally, the objective of optimizing long-term task scheduling decisions was achieved based on Lyapunov optimization techniques. Simulation results demonstrate the good performance of the proposed method in both scheduling timeliness and system information freshness.

Deep visualization classification method for malicious code based on Ngram-TFIDF
Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA
2024, 45(6):  160-175.  doi:10.11959/j.issn.1000-436x.2024115
Asbtract ( 36 )   HTML ( 5)   PDF (1675KB) ( 26 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

With the continuous increase in the scale and variety of malware, traditional malware analysis methods, which relied on manual feature extraction, become time-consuming and error-prone, rendering them unsuitable. To improve detection efficiency and accuracy, a deep visualization classification method for malicious code based on Ngram-TFIDF was proposed. The malware dataset was processed by combining N-gram and TF-IDF techniques, transforming it into grayscale images. Subsequently, the CBAM was introduced and the number of dense blocks was adjusted to construct the DenseNet88_CBAM network model for grayscale image classification. Experimental results demonstrate that the proposed method achieves superior classification performance, with accuracy improvements of 1.11% and 9.28% in malware family classification and type classification, respectively.

Design and performance analysis of dual-mode triple-dimensional index modulation differential chaos shift keying system
Lifang HE, Xinggen WU, Yansong XUE
2024, 45(6):  176-186.  doi:10.11959/j.issn.1000-436x.2024116
Asbtract ( 37 )   HTML ( 6)   PDF (1711KB) ( 26 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Given the issues of low transmission rate and poor bit error performance in traditional differential chaos shift keying systems, a dual-mode three-dimensional index modulation differential chaos shift keying (DMTD-IM-DCSK) system was proposed. This system simultaneously utilized time slots, orthogonal codes, and sort index to transmit information on both selected and unselected time slots. At the receiver, the variance of noise was reduced and the system’s error performance was improved by the use of denoising techniques. Formulas for bit error rate (BER) were derived for additive white Gaussian noise channels and multipath Rayleigh fading channels. Simulation results demonstrate that, compared to similar chaotic keying systems, the proposed system achieves higher data rates and superior error performance.

Single photodiode-based direct detection for Twin-SSB-QPSK signal in optical fiber communication systems
Hongbo ZHANG, Jiao LIU, Weiwei LING, Min ZHANG, Feng WAN, Ju CAI
2024, 45(6):  187-195.  doi:10.11959/j.issn.1000-436x.2024108
Asbtract ( 41 )   HTML ( 9)   PDF (2103KB) ( 33 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To address the high-cost issue of twin single sideband quadrature phase shift keying (Twin-SSB-QPSK) signals in optical transmission, a optical fiber communication system was proposed, in which a single photodetector (PD) was employed at the receiver to directly detect the Twin-SSB-QPSK signals. At the receiver end, optical bandpass filter (OBPF) was not required to separate the two optical single sideband signals of the Twin-SSB-QPSK signal. Instead, the heterodyne effect of direct detection was utilized, allowing a single PD to directly detect the coherent superposition of the twin two optical single sideband QPSK signals, resulting in a single 16-ary quadrature amplitude modulation (16QAM) signal. Simulations demonstrated that two 56 Gbit/s QPSK signals were combined into a single 112 Gbit/s 16QAM signal and then compared with the traditional single 16QAM signal transmission scheme. The simulation results indicate that the proposed scheme does not introduce additional power penalties while reducing the system device requirements and deployment costs.

Domain-generalization human activity recognition model based on CSI instance normalization
Yang WANG, Jiawei XU, Ao WANG, Huijuan XIA, Chuanxin ZHAO, Yimu JI
2024, 45(6):  196-209.  doi:10.11959/j.issn.1000-436x.2024110
Asbtract ( 39 )   HTML ( 9)   PDF (3702KB) ( 38 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To achieve Wi-Fi cross-domain human activity perception that was not dependent on target domain data, a domain-generalization human activity recognition model based on CSI instance normalization called INDG-Fi was proposed. The instance normalization standardization was utilized to remove domain information from the representation of CSI features by INDG-Fi. Then action classifiers and domain classifiers were constructed for shared feature extraction. By employing activity bias learning and adversarial domain learning, the model biased the features extracted from the encoding layer towards signal variations caused by human actions while moving away from domain signals. To enhance the model’s focus on subcarrier signals that were more significantly influenced by human actions, a subcarrier attention module was incorporated into the encoding layer. The implemented results demonstrate that the proposed INDG-Fi achieves perceptual accuracies of 97.99% and 92.73% for unseen users and locations, respectively, thus enabling robust cross-domain perception.

Sequential recommendation algorithm for long-tail users based on knowledge-enhanced contrastive learning
Yonggong REN, Pinglei ZHOU, Zhipeng ZHANG
2024, 45(6):  210-222.  doi:10.11959/j.issn.1000-436x.2024107
Asbtract ( 50 )   HTML ( 9)   PDF (1501KB) ( 44 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Sequential recommendation predicts next items for users based on their historical interactions. Existing methods capture long-term dependencies but struggle to recommend precisely for users with short interaction sequences, especially for long-tail users. Therefore, a sequential recommendation algorithm for long-tail users based on knowledge-enhanced contrastive learning was proposed. Firstly, semantic item similarity was introduced by leveraging relationships between entities in the knowledge graph to extract correlated items from original sequences. Secondly, two sequence augmentation operators were proposed based on different contrastive learning views, addressing the problem of insufficient training for long-tail user sequences by augmenting self-supervised signals. Finally, precise sequence recommendations were provided for long-tail users by utilizing the joint training of shared network parameters between contrastive self-supervised tasks and the recommendation task. Experimental results on real-world datasets demonstrate the effectiveness of the proposed algorithm in improving performance for long-tail users.

A Review of Threat Discovery and Forensic Analysis Based on System-level Provenance Graphs
LENG Tao , , CAI lijun lijun, YU Aimin , , ZHU ziyuan , M A Jian ganggang, LI Caofei , , NIU Ruicheng , , MENG Dan ,
Online First: 2022-07-25
Construction of De Bruijn Sequences from Whole LFSRs with 4 Cycles
ZHOU Cong wei, HU Bin, GUAN Jie
Online First: 2022-07-25
Improved Meet-in -the-Middle Attack on ReducedReduced-Round KiasuKiasu-BC Cipher
LI Manman , CHEN Shaozhen ,
Online First: 2022-07-25
Multi-level recommendation framework for local differential privacy algorithms
WANG Hanyi, LI Xiaoguang, BI Wenqing, CHEN Yahong, LI Fenghua, NIU Ben
10.11959/j.issn.1000?436x.2020029
Online First: 2022-06-25
Joint QoS prediction for Web services based on deep fusion of features
LIU Jianxun , , DING Linghang , , KANG Guosheng , , CAO Buqing , , XIAO Yong ,
Online First: 2022-06-25
A Review of Threat Discovery and Forensic Analysis Based on System-level Provenance Graphs
LENG T Tao , , CAI lijun lijun, YU Aimin , , ZHU ziyuan , M A Jian ganggang, LI Caofei , , NIU Ruicheng , , MENG Dan ,
Online First: 2022-06-25
New Dimension in Orbital Angular Momentum Transmission
Online First: 2022-06-25
6G-Oriented cross-modal signal reconstruction technology
LI Ang, CHEN Jianxin, WEI Xin, ZHOU Liang,
Online First: 2022-06-25
Multi-level recommendation framework for local differential privacy algorithms
WANG Hanyi, LI Xiaoguang, BI Wenqing, CHEN Yahong, LI Fenghua, NIU Ben
10.11959/j.issn.1000?436x.2020029
Online First: 2022-06-24
Joint QoS Prediction for Web Services based on Deep Fusion of Features
Online First: 2022-06-24
2024 Vol.45 No.6 No.5 No.4 No.3 No.2 No.1
2023 Vol.44 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2022 Vol.43 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2021 Vol.42 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2020 Vol.41 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2019 Vol.40 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2018 Vol.39 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1
2017 Vol.38 No.12 No.Z2 No.11 No.Z1 No.10 No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2016 Vol.37 No.12 No.11 No.Z1 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3 No.2
No.1
2015 Vol.36 No.12 No.11 No.Z1 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3 No.2
No.1
2014 Vol.35 No.12 No.11 No.Z2 No.10 No.Z1 No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2013 Vol.34 No.12 No.Z2 No.11 No.10 No.9 No.Z1
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2012 Vol.33 No.10 No.12 No.Z2 No.11 No.Z1 No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2011 Vol.32 No.9 No.12 No.11 No.11A No.10 No.9A
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2010 Vol.31 No.12 No.11 No.10 No.9A No.9 No.8A
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2009 Vol.30 No.12 No.11A No.11 No.10 No.10A No.9
No.8 No.7 No.6 No.5 No.4 No.3
No.2 No.1
2008 Vol.29 No.12 No.11A No.11 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3A No.3
No.2 No.1
2007 Vol.28 No.12 No.11A No.11 No.10 No.9 No.8
No.08A No.7 No.6 No.5 No.4 No.3
No.2 No.1
2006 Vol.27 No.12 No.11A No.11 No.10 No.9 No.8
No.7 No.6 No.5 No.4 No.3 No.2
No.1
2005 Vol.26 No.12 No.11 No.10 No.9 No.8 No.7
No.6 No.5 No.4 No.3 No.2 No.1A
No.1
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: