Please wait a minute...

Current Issue

    25 August 2013, Volume 34 Issue 8
    Sub-topic detection and tracking based on dependency connection weights for vector space model
    2013, 34(8):  1-9. 
    Asbtract ( 1017 )   Knowledge map   
    Related Articles | Metrics
    Aiming at the phenomenon that there are abrupt reports, similar topics and abundant levels of subtopics in the news, a novel method based on relationship analysis using dependent sentence pattern was proposed for sub-topic detection and tracking (sTDT), which constructed feature dimensions to generate the global vectors according to the increment of TF-IDF, and then created the partial adjoin map based on the connection weights within the time window and decreased the dimensions through dependent sentence pattern. Finally, a novel method for sTDT computing was built with adjoins dictionary weights and time threshold attenuation. Experiments show that the proposed method transferrs the text from linear to plane structure, and extracts the subtopics effectively, of which the minimum DET cost is reduced by at least 2.2 percent than that of classical methods.
    Papers
    Sub-topic detection and tracking based on dependency connection weights for vector space model
    Xue-guang ZHOU,Fei GAO,Yan SUN
    2013, 34(8):  1-9.  doi:10.3969/j.issn.1000-436x.2013.08.001
    Asbtract ( 188 )   HTML ( 0)   PDF (1870KB) ( 451 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the phenomenon that there are abrupt reports,similar topics and abundant levels of subtopics in the news,a novel method based on relationship analysis using dependent sentence pattern was proposed for sub-topic detection and tracking (sTDT),which constructed feature dimensions to generate the global vectors according to the increment of TF-IDF,and then created the partial adjoin map based on the connection weights within the time window and decreased the dimensions through dependent sentence pattern.Finally,a novel method for sTDT computing was built with adjoins dictionary weights and time threshold attenuation.Experiments show that the proposed method transferrs the text from linear to plane structure,and extracts the subtopics effectively,of which the minimum DET cost is reduced by at least 2.2 percent than that of classical methods.

    Research on RFID anti-collision hybrid algorithm based on discrete processing
    2013, 34(8):  2-17. 
    Asbtract ( 782 )   Knowledge map   
    Related Articles | Metrics
    A kind of binary tree search algorithms have distinct application limitations such as high number of requests in case that a fairly large number of tags are available. A hybrid anti-collision algorithm was proposed, combining binary tree search with discrete processing. Theoretic analysis show that, different from available schemes, the algorithm essentially performs binary tree search not on a single tag, but on models which identify the property of discrete procession. The proposed algorithm fully takes the time of request into account, as well as power consumption and throughput of the system. Simulation result verifies that the algorithm achieves much better performances such as the time of request and throughput than the previous algorithms.
    Rational analysis of authentication protocols based on NGUYEN L H scheme
    2013, 34(8):  3-26. 
    Asbtract ( 794 )   Knowledge map   
    Related Articles | Metrics
    Using the ideas of game theory, NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability before the normal protocol run, so that even if an attacker attacks a protocol, the attacker’s payoff will still be lower than that when it does not. In such a way, the security of the protocol was guaranteed. However, this scheme suffers from two shortcomings: the considered is too attacker powerful, and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered. To improve this scheme, the value of , with the consideration of the attack cost, of which the value is more general was given. What’s more, the attack probability was introduced. Based on this, the precondition that the honest node transmits the useless data was presented, as well as the value of under the different values. Compared with the original scheme, this results are more generic and comprehensive. Meanwhile, through a case analysis in the P2P network, the correctness of the conclusion is proved.
    Self-organized CAC mechanism adopting for self-similarity service in wireless network
    2013, 34(8):  4-34. 
    Asbtract ( 803 )   Knowledge map   
    Related Articles | Metrics
    To improve the access capacity in wireless network with the QoS ensuring, the service similarity in the wireless network was researched, and the service bandwidth was calal with similarity and QoS parameters. Then an SS-CAC (self-organized based on network similarity call admission control) mechanism based on the service bandwidth optimization was introduced to lower the system bandwidth utilization and service rejection probability. And the novel mechanism was achieved and simulated. Compared with traditional CAC, the results of simulation show the performance of SS-CAC mechanism can not only ensure the quality of the voice service but also reduce the bandwidth utilization of the data service by 2.69%. In addition, it can also reduce the call rejection ratio and call drop ratio by 0.95% and 2.81% respectively in the case of high cell load.
    Adjustable lifetime-prolonging structure for topology control in heterogeneous wireless sensor network
    2013, 34(8):  5-43. 
    Asbtract ( 768 )   Knowledge map   
    Related Articles | Metrics
    The problem of topology control in a network of heterogeneous wireless devices with different maximum transmission ranges was considered. For most topology control structures, the energy model adopted is quite unrealistic, in which the reception energy is commonly neglected. Moreover, most existing approaches to topology control were mainly considered to preserve energy-efficient paths in the resulting topology structures which may not allow network to realize maximum potential lifetime. An adjustable lifetime-prolonging structure for heterogeneous wireless sensor network (ALPH) to control topology was presented. Different from the prior work, based on the more realistic energy model, preserving all the maximal lifetime paths in the resulting topology structures was considered. Properties of ALPH by proof or simulation shows: the topologies derived under ALPH preserve the network connectivity and bi-directionality; it preserves all maximal lifetime paths between any pair of nodes under different RF modules; it enables each node to adjust the topology independently between DRNG and the MaxPower graph via parameter PR0 and allows nodes to have different path loss exponents; compared with previous work of DRNG, DGG, EYG and the MaxPower graph based on the real device’s parameters, it can effectively prolong network lifetime.
    IEDR: an infrastructure enhanced DTN routing protocol
    2013, 34(8):  6-52. 
    Asbtract ( 723 )   Knowledge map   
    Related Articles | Metrics
    To cope with un-ideal conditions in mobile network where connectivity is only intermittent, a novel DTN (delay tolerant network) routing protocol, IEDR, was proposed, which incorporates experiences gained before and strives to fully utilize node contacts for data exchange, in order to maximize delivery ratio and minimize delivery delay, while still with controlled overhead. Additionally, IEDR attempted to use wireless access points for data propagation, as access points were supposed to be widely deployed and interconnected with high speed, providing an opportunity to efficiently distribute data in large areas. The evaluation proves that IEDR is better than many classic DTN routing protocols.
    Transductive quantitative calculation approach of network abnormality index
    2013, 34(8):  7-61. 
    Asbtract ( 831 )   Knowledge map   
    Related Articles | Metrics
    For the problem of network abnormality index calculation, a transductive quantitative calculation approach named QCDP was proposed based on quantitative characteristics index, composition characteristics index, distribution characteristics index and pattern characteristics index. Seven experiments using real network traces were made to validate the effectiveness of QCDP. Theoretical analysis and experimental results show that, compared with the traditional transductive method based on traffic, the QCDP can more effectively reflect the macro situation of typical network security incidents; compared with the inductive methods, the QCDP has better objectivity, instantaneity and practicability.
    RANSAC based robust localization algorithm for visual sensor network
    2013, 34(8):  8-69. 
    Asbtract ( 699 )   Knowledge map   
    Related Articles | Metrics
    Due to node failures or environmental changes, observed data on the target will be error in visual sensor network, so the least squares based multi-vision localization algorithm won’t be accurate. A centralized RANSAC based robust localization method was proposed, which can remove the error data and improve the positioning accuracy. Furthermore, to address this issue, energy imbalance of network nodes in centralized RANSAC where all computing load is executed in one single node, a robust localization algorithm based on distributed RANSAC was also proposed, which can distribute a large number of iterative calculations into each node averagely to ensure the network balance on calculation and energy without affecting the robustness. Finally, through comparing experiments on no-RANSAC, cen-RANSAC and dis-RANSAC, it’s verified that this algorithm can obtain robust and good positioning results in a predetermined probability, and the time complexity was analyzed via experiment.
    Application of invariant moment method for HAPS ISAR imaging with micro parts
    2013, 34(8):  9-75. 
    Asbtract ( 694 )   Knowledge map   
    Related Articles | Metrics
    To resolve the micromotion in the HAPS(high altitude platform station) ISAR system, the invariant moment method for ISAR imaging with micro parts was proposed. Firstly, invariant moment tool was applied to classify the echoes of different sub-aperture, and then the sub-aperture echoes reducing the quality of image was separated. Finally the remaining echoes were used to do sub-aperture splicing imaging. From the simulation results, the algorithm is proved to be simple and can improve the quality of ISAR image obviously.
    Method for quality assessment of image mosaic
    2013, 34(8):  10-81. 
    Asbtract ( 879 )   Knowledge map   
    Related Articles | Metrics
    On the basis of the theory of existing methods for image quality assessment, a novel method for quality assessment of mosaicked image based on the information of image edge was presented. The method was in accordance with the features of mosaicked image. Firstly, the edges of image were detected. Then according to the information of image edges, the information of pixel error and structure was considered. The mean value and variance of the difference of edge map were related with the misplacement and the brightness mutation, which influenced the quality of mosaicked image. Lastly, the evaluate procedure was done based on the relationship. The new method was more consistent with the subjective feeling to the mosaicked image quality. This method accurately reflects the real quality of mosaicked image and the performance of the algorithm of image mosaic.
    Papers
    Research on RFID anti-collision hybrid algorithm based on discrete processing
    Ping LI,Li-min SUN,Jia-ying WU,Qing FANG,Jin-yang XIE,Bo-xiang ZHOU
    2013, 34(8):  10-17.  doi:10.3969/j.issn.1000-436x.2013.08.002
    Asbtract ( 160 )   HTML ( 1)   PDF (1303KB) ( 277 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A kind of binary tree search algorithms have distinct application limitations such as high number of requests in case that a fairly large number of tags are available.A hybrid anti-collision algorithm was proposed,combining binary tree search with discrete processing.Theoretic analysis show that,different from available schemes,the algorithm essentially performs binary tree search not on a single tag,but on models which identify the property of discrete procession.The proposed algorithm fully takes the time of request into account,as well as power consumption and throughput of the system.Simulation result verifies that the algorithm achieves much better performances such as the time of request and throughput than the previous algorithms.

    Correlation-immunity study of balanced H-Boolean functions
    2013, 34(8):  11-87. 
    Asbtract ( 660 )   Knowledge map   
    Related Articles | Metrics
    As a novel definition, E-derivative was introduced to study problems that are extremely difficult to handle in the cryptographic system. By using the way of combining derivative with E-derivative and correlation-immunity of H-Boolean functions, the distribution structure of balanced H-Boolean functions were deeply analyzed, and some important results on how to determine whether or not a H-Boolean function has correlation-immunity with the relatively simplified method of distinguishing different structure were also obtained, which are going to play important roles in the field of cryptology and future worldwide applications. Beyond that, the problem of the most higher-order correlation-immunity of H-Boolean function which is also one of the most difficult unsolved problems in cryptology was solved successfully to improve the anti-attack ability of cryptosystem and ensured the secure transmission of secret information on the network effectively .
    Smart-blacklisting: an efficient methodology for mitigating fake block attack in P2P file-sharing systems
    2013, 34(8):  12-94. 
    Asbtract ( 876 )   Knowledge map   
    Related Articles | Metrics
    Fake block attack intends to prolong the downloading time by providing fake data to make the file block fail in the hash check. P2P file-sharing systems are susceptible to fake block attacks, whereby malicious clients are able to make a big impact on users’ downloading experience. An efficient methodology named Smart-blacklisting, which aims to lessen the downloading time and bandwidth wastes interfered by the attack was proposed through using a mathematic model, and the efficiency of this method was analyzed during a simulation experiment. The ovel approach presents 87% downloading time and 50% bandwidth wastes compare less than those of eMule blacklisting method.
    Combined wideband speech enhancement method based on statistical model and EMD
    2013, 34(8):  13-101. 
    Asbtract ( 651 )   Knowledge map   
    Related Articles | Metrics
    A combined wideband speech enhancement method based on statistical model and empirical mode decomposition (EMD) was proposed. First, statistical model was used to eliminate the main noise component in noisy speech. Then, the residual noise was further suppressed by a post-processing module which is a speech enhancement algorithm with voice activity detection (VAD) based on EMD. The advantages of the two methods were combined effectively. The performance of the proposed method was evaluated under the standard of ITU-T G160. The experimental results indicate that the algorithm is more effective for improving the SNR in the different noise environments than classical statistical model approach. Meanwhile, in low SNR conditions, musical noise is reduced effectively, and the speech sounds more comfortable.
    Efficient i-DFA construction algorithm based on state grouping
    2013, 34(8):  14-109. 
    Asbtract ( 873 )   Knowledge map   
    Related Articles | Metrics
    Regular expression matching plays an important role in many network and security applications. DFA is the preferred representation to perform regular expression matching in high-speed network, because of its high and stable matching efficiency. However, DFA may experience state explosion, and thus consume huge memory space. As a classical solution for the problem of state explosion, i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time. However, prior methods are inefficient in both time and space during the construction of i-DFA. An efficient i-DFA construction algorithm based on the idea of state grouping was proposed. Furthermore, a formal description for the problem of state grouping was given, and it was proved that it was NP-hard to get the best state grouping result. Thus, based on local search strategy, a near-optimal algorithm was introduced to divide states into different groups. Compared with the classical construction method, the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.
    RSPEED:the reliability and real-time routing based on uncertain delay in wireless sensor network
    2013, 34(8):  15-119. 
    Asbtract ( 845 )   Knowledge map   
    Related Articles | Metrics
    The forwarding reliability was proposed by considering the unreliability and the delay of a link, and with which, a novel real-time routing protocol(RSPEED) was designed. The forwarding reliability denoted the probability to deliver the data successfully to the neighbor node under a given deadline, and it was used to achieve probabilistic QoS guarantee in timeliness and reliability. The protocol can also make trade-off between the transmission delay and the reliability of transmission to improve the probability of successful transmission when the environment and link quality is very poor. The experimental results show that the proposed approach can significantly improve the reliability of transmission and reduces the number of the missed deadline, and even when the channel is very poor, it can achieve 20% higher performance than SPEED.
    Bandwidth extension method based on nonlinear audio characteristics classification
    2013, 34(8):  16-131. 
    Asbtract ( 708 )   Knowledge map   
    Related Articles | Metrics
    A bandwidth extension method based on audio classification was proposed. Time series of audio signals were classified into four types based on recurrence plot and recurrence quantification analysis, and the fine spectrums were recovered by taking advantage of four methods respectively. In addition, the spectrum envelope and energy gain were adjusted by Gaussian mixture model and codebook mapping on the basis of soft decision respectively. Subjective and objective testing results indicate that the proposed method has good quality compared with conventional blind bandwidth extension methods, and the performance of ITU-T G.722.1 codec with the proposed algorithm is better than that of G.722.1C codec at the same bit rate.
    Research on multiflow in wireless networks based on network coding
    2013, 34(8):  17-139. 
    Asbtract ( 843 )   Knowledge map   
    Related Articles | Metrics
    In a multihop wireless network, wireless interference is crucial to the multi-commodity flow problem, which studies the maximum throughput between multiple pairs of sources and sinks. Based on the observation that network coding (NC) could help to decrease the impacts of wireless interference, a framework was proposed to solve the problem for multihop wireless networks with NC. By introducing hyperarcs to model all possible (uncoded or encoded) transmissions and using the conflict graph of hyperarcs to describe the new conflict relations modified by NC (e.g., in the protocol interference model), the problem was formulated to compute the maximum throughput of multiple unicast flows supported by the multihop wireless network with given NC settings, in which the constraints were rebuilt from the conflict graph of hyperarcs. Furthermore, a practical algorithm was proposed to collect maximal independent sets, instead of collecting all maximal independent sets in the conflict graph of hyperarcs (which is NP-hard), and some numerical results were illustrated.
    Backdoor detection in embedded system firmware without file system
    2013, 34(8):  18-145. 
    Asbtract ( 730 )   Knowledge map   
    Related Articles | Metrics
    Any embedded system firmware without file system will integrate its system code and user application code into a single file. This setting has brought some additional difficulties to analyze them. Aimed at this kind of firmware, the problem of library function identification was analyzed, and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed. Based on this analysis, the backdoor detection problem of some typical types including unauthorized listener, unintended function, hidden function, outward connection request etc. were discussed, and several backdoors (one is critical level) in a real world firmware were found. The result shows this method of identifying library function can be useful for security analysis to this type of firmware.
    Papers
    Rational analysis of authentication protocols based on NGUYEN L H scheme
    Xing-hua LI,Ling-juan DENG,Yuan ZHANG,Jian-feng MA
    2013, 34(8):  18-26.  doi:10.3969/j.issn.1000-436x.2013.08.003
    Asbtract ( 180 )   HTML ( 2)   PDF (1113KB) ( 474 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.

    Online analytical model of massive malware based on feature clusting
    2013, 34(8):  19-153. 
    Asbtract ( 929 )   Knowledge map   
    Related Articles | Metrics
    In order to improve the effectiveness and efficiency of mass malicious code analysis, an online analytical model was proposed including feature space construction, automatic feature extraction and fast clustering. Our research focused on the law of malware behavior and code string distribution by dynamic and static techniques. In this model, a sample was described with its API and key code fragment. This model proposed a fast clustering approach to identify group samples that exhibit similar feature when applied this model to real-world malware collections. The result demonstrates that the proposed model is able to extract feature automatically, support streaming data clustering on large-scale, and achieve better precision.
    Review on video privacy protection
    2013, 34(8):  20-160. 
    Asbtract ( 856 )   Knowledge map   
    Related Articles | Metrics
    With the rapid development of the Internet and the tremendous proliferation of video applications, video privacy protection has garnered significant attention nowadays. It is a key problem to protect privacy while ensuring normal application. A survey of video privacy protection technologies was presented, and summary, comparison and analysis were mainly in three aspects: privacy extraction, privacy protection and access control. Moreover, some distinctive issues that correlate to privacy protection in video surveillance, such as privacy definition and perceptive security evaluation were also addressed. Finally, challenges and perspectives of video privacy protection technology were discussed.
    Fair and anonymous ID-based multi-receiver signcryption
    2013, 34(8):  21-168. 
    Asbtract ( 712 )   Knowledge map   
    Related Articles | Metrics
    In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme, a novel identity-based multi-receiver signcryption scheme, using the Lagrange interpolation method, was proposed to meet the requirements of the identity anonymity and the decryption fairness. Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions, the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model, which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.
    Balanced energy-efficient routing algorithm based on smart antenna and dynamic virtual cluster
    2013, 34(8):  22-176. 
    Asbtract ( 631 )   Knowledge map   
    Related Articles | Metrics
    An energy-efficient and energy-consumption-balanced routing, named SaDVC-Routing, was put forward for WSN. The algorithm constructs virtual clusters based on assistant relays in the area of smart antenna beams, and then selects the node with maximum relay weight from the cluster to act as routing relay. With the help of energy consumption and nodes distance information, SaDVC-Routing can dynamically update the virtual clusters with beam expanding. If the beam width exceeds the threshold, a routing request is re-broadcasted based on weighted distance matrix. According to the simulation, it was found that this algorithm could not only decrease the energy consumption, but also get consumption balance between nodes in the local and global area.
    M-ary position and three-valued VMAP modem
    2013, 34(8):  23-184. 
    Asbtract ( 1191 )   Knowledge map   
    Related Articles | Metrics
    In order to improve the spectral efficiency and energy efficiency of asymmetry, random-polar and very minimum amplitude and phase (ARP-VMAP) modulated signal simultaneously, an M-ary position and three-valued VMAP modulation was presented, and the receiver based on BP neural network or support vector machine demodulator was also designed. The contrast and analysis of the power spectrum, the ?60 dB bandwidth, the spectral efficiency, and the demodulation performance among modulations as the ARP-VMAP, the three-valued VMAP, the M-ary position ARP-VMAP, and the M-ary position and three-valued VMAP, were carried out. Simulation results show that the new modem not only raise spectral efficiency, but also improve demodulation performance significantly.
    ID-based on-line/off-line threshold signature scheme without bilinear pairing
    2013, 34(8):  24-190. 
    Asbtract ( 713 )   Knowledge map   
    Related Articles | Metrics
    Based on the distributed key generation (DKG) protocol and verifiable secret sharing (VSS) protocol, an identity-based on-line/off-line threshold signature scheme was proposed in order to eliminate the cost of the certificate management in the public key cryptosystem and improve the performance of on-line/off-line threshold signature schemes. This scheme was proven to be robust and unforgeable under the discrete logarithm assumption. Analysis results show that the proposed scheme eliminates the problem of certificate management and pairing operation, and it greatly reduces computation cost of off-line threshold signature generation algorithm and signature verification algorithm. The new scheme is more efficient than the available on-line/off-line threshold signature schemes.
    Papers
    Self-organized CAC mechanism adopting for self-similarity service in wireless network
    Lei FENG,Wen-jing LI,Xue-song QIU
    2013, 34(8):  27-34.  doi:10.3969/j.issn.1000-436x.2013.08.004
    Asbtract ( 207 )   HTML ( 0)   PDF (2136KB) ( 393 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve the access capacity in wireless network with the QoS ensuring,the service similarity in the wireless network was researched,and the service bandwidth was calal with similarity and QoS parameters.Then an SS-CAC (self-organized based on network similarity call admission control) mechanism based on the service bandwidth optimization was introduced to lower the system bandwidth utilization and service rejection probability.And the novel mechanism was achieved and simulated.Compared with traditional CAC,the results of simulation show the performance of SS-CAC mechanism can not only ensure the quality of the voice service but also reduce the bandwidth utilization of the data service by 2.69%.In addition,it can also reduce the call rejection ratio and call drop ratio by 0.95% and 2.81% respectively in the case of high cell load.

    Adjustable lifetime-prolonging structure for topology control in heterogeneous wireless sensor network
    Xiao-hong LI,Jing-qiao GE,Da-fang ZHANG
    2013, 34(8):  35-43.  doi:10.3969/j.issn.1000-436x.2013.08.005
    Asbtract ( 197 )   HTML ( 1)   PDF (2203KB) ( 520 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The problem of topology control in a network of heterogeneous wireless devices with different maximum transmission ranges was considered.For most topology control structures,the energy model adopted is quite unrealistic,in which the reception energy is commonly neglected.Moreover,most existing approaches to topology control were mainly considered to preserve energy-efficient paths in the resulting topology structures which may not allow network to realize maximum potential lifetime.An adjustable lifetime-prolonging structure for heterogeneous wireless sensor network (ALPH) to control topology was presented.Different from the prior work,based on the more realistic energy model,preserving all the maximal lifetime paths in the resulting topology structures was considered.Properties of ALPH by proof or simulation shows:the topologies derived under ALPH preserve the network connectivity and bi-directionality; it preserves all maximal lifetime paths between any pair of nodes under different RF modules; it enables each node to adjust the topology independently between DRNG and the MaxPower graph via parameter P R 0 and allows nodes to have different path loss exponents; compared with previous work of DRNG,DGG,EYG and the MaxPower graph based on the real device’s parameters,it can effectively prolong network lifetime.

    IEDR:an infrastructure enhanced DTN routing protocol
    Zhen YU,Jing-dong XU,Jian-zhong ZHANG,Yu ZHANG
    2013, 34(8):  44-52.  doi:10.3969/j.issn.1000-436x.2013.08.006
    Asbtract ( 208 )   HTML ( 3)   PDF (1193KB) ( 294 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To cope with un-ideal conditions in mobile network where connectivity is only intermittent,a novel DTN (delay tolerant network) routing protocol,IEDR,was proposed,which incorporates experiences gained before and strives to fully utilize node contacts for data exchange,in order to maximize delivery ratio and minimize delivery delay,while still with controlled overhead.Additionally,IEDR attempted to use wireless access points for data propagation,as access points were supposed to be widely deployed and interconnected with high speed,providing an opportunity to efficiently distribute data in large areas.The evaluation proves that IEDR is better than many classic DTN routing protocols.

    Transductive quantitative calculation approach of network abnormality index
    Yong-zheng ZHANG,Yong-lin ZHOU,Fei DU
    2013, 34(8):  53-61.  doi:10.3969/j.issn.1000-436x.2013.08.007
    Asbtract ( 231 )   HTML ( 0)   PDF (815KB) ( 407 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the problem of network abnormality index calculation,a transductive quantitative calculation approach named QCDP was proposed based on quantitative characteristics index,composition characteristics index,distribution characteristics index and pattern characteristics index.Seven experiments using real network traces were made to validate the effectiveness of QCDP.Theoretical analysis and experimental results show that,compared with the traditional transductive method based on traffic,the QCDP can more effectively reflect the macro situation of typical network security incidents; compared with the inductive methods,the QCDP has better objectivity,instantaneity and practicability.

    RANSAC based robust localization algorithm for visual sensor network
    Bo ZHANG,Hai-yong LUO,Ji-wei LIU,Fang ZHAO
    2013, 34(8):  62-69.  doi:10.3969/j.issn.1000-436x.2013.08.008
    Asbtract ( 164 )   HTML ( 1)   PDF (1585KB) ( 633 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to node failures or environmental changes,observed data on the target will be error in visual sensor network,so the least squares based multi-vision localization algorithm won’t be accurate.A centralized RANSAC based robust localization method was proposed,which can remove the error data and improve the positioning accuracy.Furthermore,to address this issue,energy imbalance of network nodes in centralized RANSAC where all computing load is executed in one single node,a robust localization algorithm based on distributed RANSAC was also proposed,which can distribute a large number of iterative calculations into each node averagely to ensure the network balance on calculation and energy without affecting the robustness.Finally,through comparing experiments on no-RANSAC,cen-RANSAC and dis-RANSAC,it’s verified that this algorithm can obtain robust and good positioning results in a predetermined probability,and the time complexity was analyzed via experiment.

    Application of invariant moment method for HAPS ISAR imaging with micro parts
    Zhao-qun QI,Xiao-jun JING,Si-qing YOU,Hai-bin SUN
    2013, 34(8):  70-75.  doi:10.3969/j.issn.1000-436x.2013.08.009
    Asbtract ( 254 )   HTML ( 1)   PDF (1313KB) ( 284 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To resolve the micromotion in the HAPS(high altitude platform station) ISAR system,the invariant moment method for ISAR imaging with micro parts was proposed.Firstly,invariant moment tool was applied to classify the echoes of different sub-aperture,and then the sub-aperture echoes reducing the quality of image was separated.Finally the remaining echoes were used to do sub-aperture splicing imaging.From the simulation results,the algorithm is proved to be simple and can improve the quality of ISAR image obviously.

    Method for quality assessment of image mosaic
    Guo-ting WAN,Jun-ping WANG,Jin LI,Hong-hua CAO,Song WANG,Le WANG,IYA-ning L,Rong WEI
    2013, 34(8):  76-81.  doi:10.3969/j.issn.1000-436x.2013.08.010
    Asbtract ( 519 )   HTML ( 24)   PDF (781KB) ( 2451 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the basis of the theory of existing methods for image quality assessment,a novel method for quality assessment of mosaicked image based on the information of image edge was presented.The method was in accordance with the features of mosaicked image.Firstly,the edges of image were detected.Then according to the information of image edges,the information of pixel error and structure was considered.The mean value and variance of the difference of edge map were related with the misplacement and the brightness mutation,which influenced the quality of mosaicked image.Lastly,the evaluate procedure was done based on the relationship.The new method was more consistent with the subjective feeling to the mosaicked image quality.This method accurately reflects the real quality of mosaicked image and the performance of the algorithm of image mosaic.

    Correlation-immunity study of balanced H-Boolean functions
    Wei-wei LI
    2013, 34(8):  82-87.  doi:10.3969/j.issn.1000-436x.2013.08.011
    Asbtract ( 238 )   HTML ( 0)   PDF (1413KB) ( 462 )   Knowledge map   
    References | Related Articles | Metrics

    As a novel definition,E-derivative was introduced to study problems that are extremely difficult to handle in the cryptographic system.By using the way of combining derivative with E-derivative and correlation-immunity of H-Boolean functions,the distribution structure of balanced H-Boolean functions were deeply analyzed,and some important results on how to determine whether or not a H-Boolean function has correlation-immunity with the relatively simplified method of distinguishing different structure were also obtained,which are going to play important roles in the field of cryptology and future worldwide applications.Beyond that,the problem of the most higher-order correlation-immunity of H-Boolean function which is also one of the most difficult unsolved problems in cryptology was solved successfully to improve the anti-attack ability of cryptosystem and ensured the secure transmission of secret information on the network effectively .

    Smart-blacklisting:an efficient methodology for mitigating fake block attack in P2P file-sharing systems
    Ru-hao YAO,Bing-shuang LIU,De-shuai QU,Yuan ZHOU,Xin-hui HAN
    2013, 34(8):  88-94.  doi:10.3969/j.issn.1000-436x.2013.08.012
    Asbtract ( 232 )   HTML ( 2)   PDF (806KB) ( 781 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fake block attack intends to prolong the downloading time by providing fake data to make the file block fail in the hash check.P2P file-sharing systems are susceptible to fake block attacks,whereby malicious clients are able to make a big impact on users’ downloading experience.An efficient methodology named Smart-blacklisting,which aims to lessen the downloading time and bandwidth wastes interfered by the attack was proposed through using a mathematic model,and the efficiency of this method was analyzed during a simulation experiment.The ovel approach presents 87% downloading time and 50% bandwidth wastes compare less than those of eMule blacklisting method.

    Combined wideband speech enhancement method based on statistical model and EMD
    Xuan ZHOU,Chang-chun BAO,Bing-yin XIA
    2013, 34(8):  95-101.  doi:10.3969/j.issn.1000-436x.2013.08.013
    Asbtract ( 285 )   HTML ( 0)   PDF (1704KB) ( 239 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A combined wideband speech enhancement method based on statistical model and empirical mode decomposition (EMD) was proposed.First,statistical model was used to eliminate the main noise component in noisy speech.Then,the residual noise was further suppressed by a post-processing module which is a speech enhancement algorithm with voice activity detection (VAD) based on EMD.The advantages of the two methods were combined effectively.The performance of the proposed method was evaluated under the standard of ITU-T G160.The experimental results indicate that the algorithm is more effective for improving the SNR in the different noise environments than classical statistical model approach.Meanwhile,in low SNR conditions,musical noise is reduced effectively,and the speech sounds more comfortable.

    Efficient i-DFA construction algorithm based on state grouping
    Deng-ke QIAO,Qing WANG,Ting-wen LIU,Yong SUN,Li GUO
    2013, 34(8):  102-109.  doi:10.3969/j.issn.1000-436x.2013.08.014
    Asbtract ( 264 )   HTML ( 1)   PDF (791KB) ( 560 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Regular expression matching plays an important role in many network and security applications.DFA is the preferred representation to perform regular expression matching in high-speed network,because of its high and stable matching efficiency.However,DFA may experience state explosion,and thus consume huge memory space.As a classical solution for the problem of state explosion,i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time.However,prior methods are inefficient in both time and space during the construction of i-DFA.An efficient i-DFA construction algorithm based on the idea of state grouping was proposed.Furthermore,a formal description for the problem of state grouping was given,and it was proved that it was NP-hard to get the best state grouping result.Thus,based on local search strategy,a near-optimal algorithm was introduced to divide states into different groups.Compared with the classical construction method,the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.

    RSPEED:the reliability and real-time routing based on uncertain delay in wireless sensor network
    Quan CHEN,Hong GAO
    2013, 34(8):  110-119.  doi:10.3969/j.issn.1000-436x.2013.08.015
    Asbtract ( 192 )   HTML ( 0)   PDF (898KB) ( 414 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The forwarding reliability was proposed by considering the unreliability and the delay of a link,and with which,a novel real-time routing protocol(RSPEED) was designed.The forwarding reliability denoted the probability to deliver the data successfully to the neighbor node under a given deadline,and it was used to achieve probabilistic QoS guarantee in timeliness and reliability.The protocol can also make trade-off between the transmission delay and the reliability of transmission to improve the probability of successful transmission when the environment and link quality is very poor.The experimental results show that the proposed approach can significantly improve the reliability of transmission and reduces the number of the missed deadline,and even when the channel is very poor,it can achieve 20% higher performance than SPEED.

    Bandwidth extension method based on nonlinear audio characteristics classification
    Li-yan ZHANG,Chang-chun BAO,Xin LIU,Xing-tao ZHANG
    2013, 34(8):  120-130.  doi:10.3969/j.issn.1000-436x.2013.08.016
    Asbtract ( 302 )   HTML ( 6)   PDF (2043KB) ( 736 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A bandwidth extension method based on audio classification was proposed.Time series of audio signals were classified into four types based on recurrence plot and recurrence quantification analysis,and the fine spectrums were recovered by taking advantage of four methods respectively.In addition,the spectrum envelope and energy gain were adjusted by Gaussian mixture model and codebook mapping on the basis of soft decision respectively.Subjective and objective testing results indicate that the proposed method has good quality compared with conventional blind bandwidth extension methods,and the performance of ITU-T G.722.1 codec with the proposed algorithm is better than that of G.722.1C codec at the same bit rate.

    Research on multiflow in wireless networks based on network coding
    Jin-yi ZHOU,Shu-tao XIA,Yong JIANG,Hai-tao ZHENG
    2013, 34(8):  131-139.  doi:10.3969/j.issn.1000-436x.2013.08.017
    Asbtract ( 305 )   HTML ( 1)   PDF (1342KB) ( 383 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In a multihop wireless network,wireless interference is crucial to the multi-commodity flow problem,which studies the maximum throughput between multiple pairs of sources and sinks.Based on the observation that network coding (NC) could help to decrease the impacts of wireless interference,a framework was proposed to solve the problem for multihop wireless networks with NC.By introducing hyperarcs to model all possible (uncoded or encoded) transmissions and using the conflict graph of hyperarcs to describe the new conflict relations modified by NC (e.g.,in the protocol interference model),the problem was formulated to compute the maximum throughput of multiple unicast flows supported by the multihop wireless network with given NC settings,in which the constraints were rebuilt from the conflict graph of hyperarcs.Furthermore,a practical algorithm was proposed to collect maximal independent sets,instead of collecting all maximal independent sets in the conflict graph of hyperarcs (which is NP-hard),and some numerical results were illustrated.

    Technical Reports
    Backdoor detection in embedded system firmware without file system
    Chao-jian HU,Yi-bo XUE,Liang ZHAO,Zhou-jun LI
    2013, 34(8):  140-145.  doi:10.3969/j.issn.1000-436x.2013.08.018
    Asbtract ( 454 )   HTML ( 18)   PDF (542KB) ( 1804 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Any embedded system firmware without file system will integrate its system code and user application code into a single file.This setting has brought some additional difficulties to analyze them.Aimed at this kind of firmware,the problem of library function identification was analyzed,and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed.Based on this analysis,the backdoor detection problem of some typical types including unauthorized listener,unintended function,hidden function,outward connection request etc.were discussed,and several backdoors (one is critical level) in a real world firmware were found.The result shows this method of identifying library function can be useful for security analysis to this type of firmware.

    Online analytical model of massive malware based on feature clusting
    Xiao-lin XU,Xiao-chun YUN,Yong-lin ZHOU,Xue-bin KANG
    2013, 34(8):  146-153.  doi:10.3969/j.issn.1000-436x.2013.08.019
    Asbtract ( 326 )   HTML ( 5)   PDF (485KB) ( 1016 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the effectiveness and efficiency of mass malicious code analysis,an online analytical model was proposed including feature space construction,automatic feature extraction and fast clustering.Our research focused on the law of malware behavior and code string distribution by dynamic and static techniques.In this model,a sample was described with its API and key code fragment.This model proposed a fast clustering approach to identify group samples that exhibit similar feature when applied this model to real-world malware collections.The result demonstrates that the proposed model is able to extract feature automatically,support streaming data clustering on large-scale,and achieve better precision.

    Comprehensive Reviser
    Review on video privacy protection
    Ling-ling TONG,Yang-xi LI,Wen-ting HUANG
    2013, 34(8):  154-160.  doi:10.3969/j.issn.1000-436x.2013.08.020
    Asbtract ( 485 )   HTML ( 25)   PDF (918KB) ( 1296 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of the Internet and the tremendous proliferation of video applications,video privacy protection has garnered significant attention nowadays.It is a key problem to protect privacy while ensuring normal application.A survey of video privacy protection technologies was presented,and summary,comparison and analysis were mainly in three aspects:privacy extraction,privacy protection and access control.Moreover,some distinctive issues that correlate to privacy protection in video surveillance,such as privacy definition and perceptive security evaluation were also addressed.Finally,challenges and perspectives of video privacy protection technology were discussed.

    Correspondences
    Fair and anonymous ID-based multi-receiver signcryption
    Liao-jun PANG,Lu GAO,Qing-qi PEI,Yu-min WANG
    2013, 34(8):  161-168.  doi:10.3969/j.issn.1000-436x.2013.08.021
    Asbtract ( 237 )   HTML ( 0)   PDF (1895KB) ( 463 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.

    Balanced energy-efficient routing algorithm based on smart antenna and dynamic virtual cluster
    Qing-song HU,Li-xin WU,Shen ZHANG,En-jie DING
    2013, 34(8):  169-176.  doi:10.3969/j.issn.1000-436x.2013.08.022
    Asbtract ( 178 )   HTML ( 1)   PDF (1357KB) ( 467 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An energy-efficient and energy-consumption-balanced routing,named SaDVC-Routing,was put forward for WSN.The algorithm constructs virtual clusters based on assistant relays in the area of smart antenna beams,and then selects the node with maximum relay weight from the cluster to act as routing relay.With the help of energy consumption and nodes distance information,SaDVC-Routing can dynamically update the virtual clusters with beam expanding.If the beam width exceeds the threshold,a routing request is re-broadcasted based on weighted distance matrix.According to the simulation,it was found that this algorithm could not only decrease the energy consumption,but also get consumption balance between nodes in the local and global area.

    M-ary position and three-valued VMAP modem
    Yi JIN,Le-nan WU,Jing YU,Lei DENG
    2013, 34(8):  177-184.  doi:10.3969/j.issn.1000-436x.2013.08.023
    Asbtract ( 171 )   HTML ( 0)   PDF (674KB) ( 297 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the spectral efficiency and energy efficiency of asymmetry,random-polar and very minimum amplitude and phase (ARP-VMAP) modulated signal simultaneously,an M-ary position and three-valued VMAP modulation was presented,and the receiver based on BP neural network or support vector machine demodulator was also designed.The contrast and analysis of the power spectrum,the ?60 dB bandwidth,the spectral efficiency,and the demodulation performance among modulations as the ARP-VMAP,the three-valued VMAP,the M-ary position ARP-VMAP,and the M-ary position and three-valued VMAP,were carried out.Simulation results show that the new modem not only raise spectral efficiency,but also improve demodulation performance significantly.

    ID-based on-line/off-line threshold signature scheme without bilinear pairing
    Xiao-dong YANG,Chun-mei LI,Ting XU,Cai-fen WANG
    2013, 34(8):  185-190.  doi:10.3969/j.issn.1000-436x.2013.08.024
    Asbtract ( 189 )   HTML ( 6)   PDF (769KB) ( 669 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the distributed key generation (DKG) protocol and verifiable secret sharing (VSS) protocol,an identity-based on-line/off-line threshold signature scheme was proposed in order to eliminate the cost of the certificate management in the public key cryptosystem and improve the performance of on-line/off-line threshold signature schemes.This scheme was proven to be robust and unforgeable under the discrete logarithm assumption.Analysis results show that the proposed scheme eliminates the problem of certificate management and pairing operation,and it greatly reduces computation cost of off-line threshold signature generation algorithm and signature verification algorithm.The new scheme is more efficient than the available on-line/off-line threshold signature schemes.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: