Please wait a minute...

Current Issue

    25 November 2016, Volume 37 Issue 11
    academic paper
    Efficient and secure message authentication scheme for VANET
    Li-bing WU,Yong XIE,Yu-bo ZHANG
    2016, 37(11):  1-10.  doi:10.11959/j.issn.1000-436x.2016211
    Asbtract ( 773 )   HTML ( 34)   PDF (1424KB) ( 1561 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new efficient identity-based message authentication scheme for VANET was proposed. The proposed scheme decreased the complexity of cryptographic operations on signature by using elliptic curve cryptosystem (ECC) to construct authentication protocol without bilinear pairing and provided the function of conditional privacy-preserving. Security analysis demonstrated that the proposed scheme satisfies all security and privacy requirements for VANET. Per-formance analysis show that compared with the most recent proposed schemes the proposed scheme decreases the com-putation cost and communication cost.

    Online trace anonymization based on anonymous flow table
    Chun-jing HAN,Jing-guo GE,Gao-gang XIE,Liang-xiong LI,Tong LI,Yun-jie LIU
    2016, 37(11):  11-22.  doi:10.11959/j.issn.1000-436x.2016214
    Asbtract ( 438 )   HTML ( 10)   PDF (570KB) ( 801 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A real-time network packet anonymous method named Fad-Pan (online trace anonymization based on the anonymous flow table) was proposed. The Fad-Pan algorithm was studied and an online trace anonymization prototype system based on DPDK library was developed. The experimental results prove that the Fad-Pan algorithm is faster more than 20 times than the existing method, and a single server can handle the real-time IPv4 and IPv6 traffic of the 10 Gbit/s link used by the Fad-Pan.

    Dynamic adaptive discrete particle swarm optimization algorithm based method on low-power mapping in network-on-chip
    Qin-rang LIU,Qi-hua DAI,Jian-liang SHEN,Bo ZHAO
    2016, 37(11):  23-30.  doi:10.11959/j.issn.1000-436x.2016215
    Asbtract ( 364 )   HTML ( 3)   PDF (993KB) ( 569 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Compared to 2D NoC, 3D NoC has better integrated density and system performance, which was a reliable method to solve the problem about low-power mapping. On the basis of the traditional particle swarm optimization algo-rithm (PSOA), a dynamic adaptive discrete particle swarm optimization algorithm (DADPSOA) was proposed . Parame-ter in this algorithm was adjusted dynamically based on the degree of early convergence and the charge of individual adap-tive value to approach the optimal solution. At the same time, the reasonable structure of the particles was made aiming at reducing the time complexity of this algorithm. Experimental results show that comparing with the random mapping, genetic algorithm (GA), PSOA and dynamic ant colony algorithm (DACA), DADPSOA can save the execution time, reduce the communication power consumption of mapping results. The power consumption of the task graph is reduced.

    Location privacy preservation approach towards to content sharing on mobile online social network
    Chao LI,Li-hua YIN,Kui GENG,Bin-xing FANG
    2016, 37(11):  31-41.  doi:10.11959/j.issn.1000-436x.2016212
    Asbtract ( 518 )   HTML ( 9)   PDF (821KB) ( 758 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A privacy access control model for content sharing was presented to fine-grained control users' location infor-mation associated with sharing content in mobile social network. A k-anonymity privacy algorithm for privacy settings was given to protect against inference attack on a content sharing service provider server. To balance the privacy and quality of service, a location shifting method was presented. Finally experimental results demonstrate the validity and practicality of the proposed approach.

    Connectivity analysis of passive cluster with high stability in vehicular wireless network
    Gong-an QIU,Zhi-hua BAO,Guo-an ZHANG,Shi-bing ZHANG
    2016, 37(11):  42-48.  doi:10.11959/j.issn.1000-436x.2016218
    Asbtract ( 370 )   HTML ( 4)   PDF (775KB) ( 787 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A passive cluster model with the maximum lifetime was proposed for vehicle to vehicle communication based on the relative velocity. The cluster head was elected based on the average relative velocity and the neighbor list. The cluster lifetime was deduced as the function of the average relative velocity. The traffic safety messages were dissemi-nated to all cluster members by inter-cluster message broadcasting and intra-cluster message relaying in interconnected vehicular network. The link connectivity probability between the cluster head and members were deduced as the function of the vehicle density for inter-cluster broadcasting. The path connectivity probability between the cluster head and the neighbor cluster head was deduced as the function of the vehicle density and intra-cluster distance for on intra-cluster dis-semination. Simulation results show that the connected probability is suitable for vehicular network under the traffic den-sity constraints.

    Dynamic and adaptive access control model
    Guo-zhen SHI,Hao-jie WANG,Yun-fei CI,Si-shui YE,Yun-chuan GUO
    2016, 37(11):  49-56.  doi:10.11959/j.issn.1000-436x.2016220
    Asbtract ( 731 )   HTML ( 19)   PDF (858KB) ( 1004 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of cloud computing technology, smart city and mobile office and emergence of mobile smart devices, the resources' environment is increasing complex. The traditional access control model has been difficult to meet the diverse access control requirements and the dynamic and adaptive access control policy. A dynamic and adap-tive access control model combining the resource life cycle management based on ABAC was proposed. The model fo-cused on resource life cycle management considering the relevance of the resource life cycle management and access control policy. In this model, the policy can be changed as the resource life cycle states' change, so the applicability has been improved. In addition, the user access behavior history management function was added in this model, which can adapt the environment better by considering history of user access behavior. At last, the model in general and cloud com-puting access control system was implemented and verified.

    Regularized manifold information extreme learning machine
    De-shan LIU,Yong-he CHU,De-qin YAN
    2016, 37(11):  57-67.  doi:10.11959/j.issn.1000-436x.2016213
    Asbtract ( 459 )   HTML ( 4)   PDF (1220KB) ( 944 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By exploiting the thought of manifold learning and its theoretical method, a regularized manifold information ex-treme learning machine algorithm aimed to depict and fully utilize manifold information was proposed. The proposed algo-rithm exploited the geometry and discrimination manifold information of data to perform network of ELM. The proposed algorithm could overcome the problem of the overlap of information. Singular problems of inter-class and within-class were solved effectively by using maximum margin criterion. The problem of inadequate learning with limited samples was solved. In order to demonstrate the effectiveness, comparative experiments with ELM and the related update algorithms RAFELM, GELM were conducted using the commonly used image data. Experimental results show that the proposed algorithm can significantly improve the generalization performance of ELM and outperforms the related update algorithms.

    Research on human blockage effect for indoor 26 GHz mm-wave communications
    Sui-yan GENG,Xing LI,Qi WANG,Guang-bo WANG,Meng-jun WANG,Shao-hui SUN,Wei HONG,Xiong-wen ZHAO
    2016, 37(11):  68-73.  doi:10.11959/j.issn.1000-436x.2016227
    Asbtract ( 473 )   HTML ( 15)   PDF (886KB) ( 490 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on 26 GHz indoor channel measurements, the blockage attenuation of human bodies was investigated. 2-ray and 4-ray human blockage models were proposed by calculation of the Vogler's multiple knife-edge diffraction field. Results show that 4-ray model fits quite well with measurement data. Human block attenuations are slightly bigger with 1 GHz than with 500 MHz bandwidth. In the blockage measurement of one person moving along the connec-tion line between the transmitter (TX) and receiver (RX), the smallest attenuation is found when the person is located at the middle of the connection line, and the biggest attenuation is observed when the person is nearest from the RX position. In the blockage measurements by multiple human bodies, the attenuation is bigger in the cases which the persons cross the TX-RX connection line with their front faces directed to the horn aperture at the RX than the cases with their lat-eral faces directed to the RX horn aperture. The blockage attenuation is larger with the increase of person numbers, about 5~8 dB more attenuation per person. The results can be used for design of mm-wave 26 GHz indoor communi-cations systems.

    Research of compressed sensing for predistortion with relatively low sampling frequency
    Xin HU,Jian-kang WANG,Fei LIU,Lian-jun OU,Jun LIANG,Gang WANG,Ji-run LUO
    2016, 37(11):  74-79.  doi:10.11959/j.issn.1000-436x.2016221
    Asbtract ( 467 )   HTML ( 5)   PDF (1627KB) ( 839 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the TWTA digital predistortion linearizer with relatively low sampling frequency, the LUT and indirect learning architecture were used, which was cumbersome. A digital predistortion linearizer with compressed sensing technology was presented, which can provide good linearity improvement with simple and stable way.

    Bankline extraction in remote sensing images using principal curves
    Yun GUO,Yi-huai WANG,Chun-ping LIU,Sheng-rong GONG,Yi JI
    2016, 37(11):  80-89.  doi:10.11959/j.issn.1000-436x.2016222
    Asbtract ( 621 )   HTML ( 10)   PDF (2732KB) ( 767 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In bankline extraction from remote sensing images, the results are usually rough and segmented. A new bankline extraction method based on the principal curves was proposed. In the learning process, the polygonal line (PL) algorithm and the error back propagation (BP) algorithm were combined. Firstly, the principal curve of the river centerline was learned. Then, a segmentation method was proposed to divide the riparian points into two sets which belong to the left and right bank respectively, and the smooth parameter expressions of the principal curves of the two banklines were given. Finally, the vec-tor description of the river centerline and banklines in remote sensing images were realized. The principal curve descriptions made the extracted banklines smooth, and the separate learning of the two banklines ensured the integrity of the extracted banklines for even narrow river channels. Comparison with the existing methods through experiments on real remote sensing images shows that the proposed method can achieve better smoothness and can be used to solve the problem of discontinuity in narrower channel of a river. The resulting vector descriptions of banklines are more convenient for storage and reconstruc-tion and can be used as shape features for the detection and identification of river area in images.

    Balanced multiple controllers placement with latency and capacity bound in software-defined network
    Kuang-yu QIN,Chuan-he HUANG,Cai-hua WANG,Jiao-li SHI,Di WU,Xi CHEN
    2016, 37(11):  90-103.  doi:10.11959/j.issn.1000-436x.2016219
    Asbtract ( 647 )   HTML ( 8)   PDF (1366KB) ( 1596 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Software-defined network (SDN) used a network architecture which separates the control plane and data plane. The control logic of SDN was implemented by the controller. Because controller's capacity was limited, in large scale SDN networks, single controller can not satisfy the requirement of all switches. Multiple controllers were needed to han-dle all data flows. By the reason that the latency between controller and switch would significantly affect the forwarding of new data flow, the rational placement of controllers would effectively improve the performance of entire network. By partition the network into multiple sub domains, on the base of spectral clustering, a method that added a balanced de-ployment object function into k-means was given and a balanced multiple controllers placement algorithm in SDN net-works which has the latency and capacity limitations was proposed. In this approach, a penalty function was introduced in the algorithm to avoid isolation nodes appearing. The simulations show that this algorithm can balance partition the net-work, keep the latency between controller and switch small and keep loads balancing between controllers.

    Fast reused code tracing method based on simhash and inverted index
    Yan-chen QIAO,Xiao-chun YUN,Yu-peng TUO,Yong-zheng ZHANG
    2016, 37(11):  104-113.  doi:10.11959/j.issn.1000-436x.2016225
    Asbtract ( 678 )   HTML ( 13)   PDF (618KB) ( 1545 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel method for fast and accurately tracing reused code was proposed. Based on simhash and inverted in-dex, the method can fast trace similar functions in massive code. First of all, a code database with three-level inverted in-dex structures was constructed. For the function to be traced, similar code blocks could be found quickly according to simhash value of the code block in the function code. Then the potential similar functions could be fast traced using in-verted index. Finally, really similar functions could be identified by comparing jump relationships of similar code blocks. Further, malware samples containing similar functions could be traced. The experimental results show that the method can quickly identify the functions inserted by compilers and the reused functions based on the code database under the premise of high accuracy and recall rate.

    Using deep learning for detecting BotCloud
    Guang KOU,Guang-ming TANG,Shuo WANG,Hai-tao SONG,Yuan BIAN
    2016, 37(11):  114-128.  doi:10.11959/j.issn.1000-436x.2016228
    Asbtract ( 1079 )   HTML ( 11)   PDF (1655KB) ( 1434 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The differences of the basic network flow characteristics between BotCloud and normal cloud services were not obvious, and this led to the inefficiency of the method in BotCloud detection based on network flow characteristics analysis. To solve this problem, a CNN(convolution neural network)-based method for detecting the BotCloud was pro-posed. First, it extracted the basic network flow characteristics from network flow data packets. Second, it mapped the basic network flow characteristics into gray image. Finally, in order to detect BotCloud, it utilized CNN algorithm to learn and extract characteristics that were more abstract to express the hidden model and structural relationship in the network data flow. The experimental results show that the proposed method can not only enhance the accuracy of detec-tion, but also greatly reduce the time required for detecting.

    Human personality privacy analysis based on visual features
    Jie NIE,Lei HUANG,Zhen LI,Jian ZHANG,Yan YAN,Zhi-qiang WEI
    2016, 37(11):  129-136.  doi:10.11959/j.issn.1000-436x.2016223
    Asbtract ( 659 )   HTML ( 15)   PDF (1335KB) ( 1016 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Personalized recommendation in social media attempts to analyze the habits and personality based on the loca-tion information and pictures from the users' comments on the public platform. This is very useful for personalized in-formation recommendation. But from perspective of privacy protection, this will affect the privacy security. A novel hu-man personality privacy analysis method based on portrait was proposed. By analyzing the personality model of the psy-chology, five visual features were proposed, including color features, texture features, shape features, Itten contrast fea-tures and expression features. Comprehensive experiments demonstrate the effectiveness of the proposed method. Further, the features analysis experiment show that the proposed features are very relevant to human personality privacy analyz-ing.

    Study on authority watermark of the electronic chart based on the semantics characteristics
    Ming-zhu LAI,Li-guo ZHANG,Wei-miao FENG,Yuan-yuan WANG,Yong WANG,Shou-zheng LI
    2016, 37(11):  137-145.  doi:10.11959/j.issn.1000-436x.2016230
    Asbtract ( 475 )   HTML ( 6)   PDF (1211KB) ( 643 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to expand the function of watermarking technology, a concept of authority watermark, for which, wa-termarks defining the users' specific operations on the digital carriers was proposed. With interception technology on im-ages, the constructed authority watermark based on the semantics characteristics of the watermark images, through the interpretation of the watermarks, accessing behaviors on the electronic chart would be controlled. Experimental results show that, this method can realize safety distribution and operation verification under the network environment, espe-cially with outstanding performance in tamper resistant and forgery.

    Anti-packet-loss joint encoding for voice-over-IP steganography
    Zhan-zhan GAO,Guang-ming TANG,Wei-wei ZHANG
    2016, 37(11):  146-155.  doi:10.11959/j.issn.1000-436x.2016231
    Asbtract ( 446 )   HTML ( 10)   PDF (1445KB) ( 596 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    VoIP (voice over IP) is a kind of voice communication technology based on UDP/IP protocols. Packet loss will inevitably happen when the channel environment deteriorates, which can pose challenges to the reliable transmission of VoIP steganography. A steganographic model based on joint encoding was proposed. In this model, packet erasure coding was introduced to preprocess the secret data. And the encoded data were embedded into voice packets with minimum dis-tortion using matrix embedding. Furthermore, the influences of key parameters on the performance of joint coding were studied. The selection algorithm for optimal parameters was also given. Experimental results show that the proposed joint coding can effectively improve steganographic resistance to packet loss, and decrease the number of modifications to the voice stream.

    Overview
    Research status and development trends of security assurance for space-ground integration information network
    Feng-hua LI,Li-hua YIN,Wei WU,Lin-jie ZHANG,Guo-zhen SHI
    2016, 37(11):  156-168.  doi:10.11959/j.issn.1000-436x.2016229
    Asbtract ( 1955 )   HTML ( 139)   PDF (665KB) ( 8697 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Space-ground integration information network consists of space-based backbone network, space-based access network, the node net of foundation, Internet, mobile communication network, which has important significance for the realization of the target of national security strategy. Firstly, the characteristics of space-ground integration network, such as exposed channel, heterogeneous network integration, etc, were analyzed. Also, the corresponding threats from the physical layer, operation layer, data layer were introduced. Secondly, a comprehensive study on current status of surviv-ability, anti-jamming, secure access, secure routing, secure handoff, secure transmission and key management were made. Finally, combined with research status, the important trends were proposed.

    Research progress on secure data deduplication in cloud
    Jin-bo XIONG,Yuan-yuan ZHANG,Feng-hua LI,Su-ping LI,Jun REN,Zhi-qiang YAO
    2016, 37(11):  169-180.  doi:10.11959/j.issn.1000-436x.2016238
    Asbtract ( 912 )   HTML ( 45)   PDF (711KB) ( 2279 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed. However, the implement of the secure data deduplication was seriously hindered by the ciphertext in cloud. This issue has quickly aroused wide attention of academia and industry, and became a research hotspot. From a security standpoint, firstly the primary cause and the main challenges of secure data deduplication in cloud environment was analyzed, and then the deduplication system model as well as its security model was described. Furthermore, focusing on the realization mechanism of secure data deduplica-tion, the thorough analyses were carried on and reviews for the related research works in recent years from content-based encryption, proof of ownership and privacy protection for secure deduplication, then the advantages and common prob-lems of various key technologies and methods were summed up. Finally, the future research directions and development trends on secure data deduplication in cloud was given.

    Academic communication
    Multi-class support vector machine-based fast algorithm for 3D-HEVC depth video intra coding
    Sheng LIU,Zong-ju PENG,Jia-li CHEN,Fen CHEN,Mei YU,Gang-yi JIANG
    2016, 37(11):  181-188.  doi:10.11959/j.issn.1000-436x.2016235
    Asbtract ( 431 )   HTML ( 1)   PDF (793KB) ( 675 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The recursive splitting process of largest coding unit (LCU) and the mode search process of coding unit imposed enormous computational complexity on encoder. A multi-class support vector machine-based (MSVM) fast coding unit (CU) size decision algorithm for 3D-HEVC depth video intra-coding was proposed. The algorithm included two steps: off-line training and fast CU size and mode decision. In the process of off-line training, a MSVM model was constructed, where the texture complexity of current LCU, the optimal partition depth of its spatial neighboring LCU and co-located LCU in texture video were treated as feature vectors, and the optimal partition depth of LCU was utilized as corresponding class label. In the process of fast CU size and mode decision, features of LCU were extracted before cod-ing a LCU, then, a MSVM model was used to predict the class label. Finally, the class label that represents the largest parti-tion depth of the current LCU was employed to terminate the CU recursive splitting process and CU mode search process. Experimental results show that the proposed algorithm saves the encoding time of 3D-HEVC by 35.91% on average, and the encoding time of depth video by 40.04% on average, with negligible rendered virtual view image degradation.

    Zero correlation-integral attack of MIBS block cipher
    Qing-cong LIU,Ya-qun ZHAO,Meng MA,Feng-mei LIU
    2016, 37(11):  189-195.  doi:10.11959/j.issn.1000-436x.2016234
    Asbtract ( 414 )   HTML ( 6)   PDF (1013KB) ( 980 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    MIBS is a lightweight block cipher for extremely constrained environments such as RFID tags and sensor networks. The MIBS algorithm's ability to resist zero correlation-integral analysis was evaluated. An 8-round zero corre-lation linear distinguisher of MIBS was given. Then, a 8-round distinguisher of MIBS was founded by using relationship between zero-correlation linear distinguisher and integral distinguisher. Finally, considering the symmetrical structure of the MIBS and using the partial-sum technique, it applied integral attack to 10 and 12 rounds of MIBS-80. The time com-plexities of 10 and 12 round attack on MIBS-80 are 227.68and 248.81. The data complexity is 248.

    Formal verification and implementation of safety computer communication management mechanism
    Liang LIANG,Yuan CAO,Lian-chuan MA,Yu-zhuo ZHANG,Heng-kui LI
    2016, 37(11):  196-204.  doi:10.11959/j.issn.1000-436x.2016237
    Asbtract ( 450 )   HTML ( 7)   PDF (768KB) ( 790 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the system compatibility of the safety computer of the next generation train operation con-trol system, first of all, the structure was analyzed and the management mechanism was designed, the state transition model of management unit was established, and the correctness of the model was verified by formal verification tools at the same time. Then the software and hardware which based on micro controller unit (MCU) were designed and imple-mented. The verification and test results show that the management mechanism design meets the design requirements, the management unit can achieve the expected state transfer function.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: