Please wait a minute...

Current Issue

    25 January 2017, Volume 38 Issue 1
    Papers
    Trust chain generating and updating algorithm for dual redundancy system
    Lei WANG,Ming-hua YANG,Zeng-liang LIU,Jian-qun ZHENG
    2017, 38(1):  1-8.  doi:10.11959/j.issn.1000-436x.2017001
    Asbtract ( 654 )   HTML ( 4)   PDF (599KB) ( 870 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In trusted computing field,the traditional construction mode of trust chain is only applicable to a single system.For the dual redundancy system,it causes break of transitive trust.A trust model suitable for dual redundancy system was proposed.Through double trust chain design and IMC/IMV interaction mechanism,the trust chain extension of trust from a computing unit to another unit was realized.On this basis,a trust chain generating and update algorithm for dual redundancy system was proposed.Finally,the validity of the proposed model was proved based on the trusting theory.

    Doppler auxiliary time synchronization algorithm for underwater acoustic sensor network
    Xiao-ning FENG,Zhuo WANG,Xiao-long ZHU,Wen ZHANG
    2017, 38(1):  9-15.  doi:10.11959/j.issn.1000-436x.2017002
    Asbtract ( 508 )   HTML ( 7)   PDF (646KB) ( 963 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Time synchronization problem in underwater acoustic sensor networks (UWSN) was studied.Due to the propagation of acoustic signals in underwater environment and nodes movement bring some problems to time synchronization.A distributed time synchronization algorithm was proposed based on Doppler method,called NU-Sync.NU-Sync solved the problem of uncertainty propagation delay caused by nodes movement through calculating relative velocity.And autonomous underwater vehicle (AUV) was used as beacon node which can save energy consumption in the process of calculation clock skew.Simulation resulted show NU-Sync achieves high level time synchronization precision.

    Cluster-based resource allocation mechanism for Femtocell network
    Hai-bo ZHANG,Jian ZOU,Kai-jian LIU,Shan-xue CHEN
    2017, 38(1):  16-25.  doi:10.11959/j.issn.1000-436x.2017003
    Asbtract ( 508 )   HTML ( 5)   PDF (1581KB) ( 1078 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A based-cluster resource allocation mechanism was proposed for suppressing interference between Femtocell and Macrocell in Macro-Femto network.The mechanism included three parts,FBS was put in disjoint clusters by graph theory and convex optimization,then a sub-channel allocation algorithm was adopted to assign sub-channel to the FUE and MUE based on fairness of rate.In the end,power allocation was performed by using distributed algorithm.Simulation results show that the proposed mechanism effectively suppresses cross-tier and co-tier interference in the Macro-Femto network,improves the average rate,meanwhile satisfies the requirements of fairness of rate,which makes users more satisfied.

    Study of single image dehazing algorithm based on propagated filtering and minimum color channels
    Hong-zhong TANG,Xiao-gang ZHANG,Ling ZHU,Hua CHEN,Xiang WANG,Xiao LI
    2017, 38(1):  26-34.  doi:10.11959/j.issn.1000-436x.2017004
    Asbtract ( 655 )   HTML ( 4)   PDF (1852KB) ( 1061 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the challenging problem that the edge regions of image have some remained hazes and blackspots,a novel image dehazing algorithm was proposed based on the minimal color channel and propagated filtering.Firstly,an initial atmospheric transmission map was obtained by double-area filtering,then a minimal channel color was introduced as a reference image,and the propagated filtering was combined to optimize the initial atmospheric transmission map.Optimized transmission have the similar edge characteristics as the referenced image,so the deviation of transmission estimation can be effectively avoided for the edge pixels in the depth mutated regions,and the redundant texture information were removed in the initial transmission map.Finally,L-BFGS was used to restore atmospheric light,and the haze-free image can be recovered based on the atmospheric scattering model.Experimental results show that proposed algorithm has the more accurate transmission estimation for the depth mutated edge regions of image,so the recovered image effectively preserves the edges and details in the depth mutated regions,and has better spatial smoothness in the uniform depth regions.The recovered haze-free image with proposed method has a better sharpness and richer color degree.

    Research of embedding algorithm for wireless network virtualization
    Bin CAO,Shi-chao XIA,Fang HE,Yun LI
    2017, 38(1):  35-43.  doi:10.11959/j.issn.1000-436x.2017005
    Asbtract ( 581 )   HTML ( 15)   PDF (1078KB) ( 988 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.

    Weibo spammers’ identification algorithm based on Bayesian model
    Yan-mei ZHANG,Ying-ying HUANG,Shi-jie GAN,Yi DING,Zhi-long MA
    2017, 38(1):  44-53.  doi:10.11959/j.issn.1000-436x.2017006
    Asbtract ( 1599 )   HTML ( 126)   PDF (1156KB) ( 2833 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to distinguish the spammers efficiently,a classifier based on the behavior characteristics was established.By analyzing the previous research,the ratio of followers,total number of blog posts,the number of friends,comprehensive quality evaluation and favorites according to latest data set,the Weibo spammers’ identification algorithm was realized based on Bayesian model and genetic algorithm.The experiment result based on the real-time data of Sina Weibo verify that the Bayesian model recognition algorithm can ensure spammers recognition accuracy without sacrificing recognition rate of non-spammers,and the proposed threshold value matrix proposed optimization can significantly improve recognition accuracy navy.

    Hybrid access control algorithm based on relay node assistant in Femtocell network
    Cheng-yi LIU,Geng CHEN,Song XING,Lian-feng SHEN
    2017, 38(1):  54-65.  doi:10.11959/j.issn.1000-436x.2017007
    Asbtract ( 345 )   HTML ( 3)   PDF (1335KB) ( 648 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A Femtocell hybrid access control algorithm assisted with relay note was proposed to supply higher performance for the Femtocell neighboring users (NUE) in heterogeneous network.Deploying relay outside the Femtocell networks was used and amplify-and-forward (AF) relaying protocol or direct link protocol was alternated to use for the data transmission of Femtocell NUE.An optimization problem was formulated with the constraints of the required transmission rates thresholds of Femtocell registered users (FUE),the thresholds of the cross-tier interferences to the macrocell users (MUE),and total transmit powers of the Femtocell base station (FBS).By using the dual decomposition method,a Femtocell hybrid access control algorithm was given based on the combination of the direct mode and relay mode.Simulation results have shown that the scheme can not only protect the QoS required by the FUE,but also decrease the cross-tier interferences suffered by the MUE.It also illustrates the better performance of the NUE through the dynamic and flexible access mechanism.Furthermore,based on the last simulation the relay link would help the NUE obtain about 25% more performance than the traditional direct link in some regions.

    Efficient identity-based fully homomorphic encryption over NTRU
    Ran DUAN,Chun-xiang GU,Yue-fei ZHU,Yong-hui ZHENG,Li CHEN
    2017, 38(1):  66-75.  doi:10.11959/j.issn.1000-436x.2017008
    Asbtract ( 516 )   HTML ( 13)   PDF (1658KB) ( 1141 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fully homomorphic encryption is the best solution for solving privacy concerns for data over cloud so far,while large public key size is a general shortcoming for existing schemes.First,by introducing the concept of Kullback-Leibler divergence,an identity-based public key scheme over NTRU lattice with modified ciphertext form was proposed.Analysis on parameter setting showed its small key size and ciphertext size,and experiments revealed its high computational efficiency.Second,with the idea of approximate eigenvector,an improved method to convert the scheme into an identity-based fully homomorphic encryption one was put forward to further reduce ciphertext size.Compared with existing schemes,the converted scheme not only abandons evaluation keys to make it fully identity-based,but also has smaller keys and ciphertext,which results in higher computational and transmission efficiency.

    Full duplex secret transmission scheme based on user cooperation
    Xiao-lei KANG,Xin-sheng JI,Lu XIA,Kai-zhi HUANG
    2017, 38(1):  76-82.  doi:10.11959/j.issn.1000-436x.2017009
    Asbtract ( 461 )   HTML ( 2)   PDF (778KB) ( 712 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Full-duplex artificial noise scheme can achieve a limited improvement while the interference power keeps increasing and the full-duplex gain is null.To solve these two problems,a full-duplex secure transmission scheme based on user cooperation was proposed,in which the full-duplex receiver used partial power to send artificial noise,and transmitted the downlink signal by the remaining power to the user who shared the same frequency.In order to maximize the system secrecy rate,the beam vector of the desired signal and the artificial noise were designed.Besides,the optimal power allocation factor was obtained by one-dimensional search simply.Simulation results show that compared with the RS-ref and HD methods,the proposed method can achieve an approximate linear growth in high power and can obtain the full-duplex gain.

    Weighted evidence combination based on degree of credibility and certainty
    Lu WANG,Qing-hua XING,Yi-fan MAO
    2017, 38(1):  83-88.  doi:10.11959/j.issn.1000-436x.2017010
    Asbtract ( 339 )   HTML ( 1)   PDF (1061KB) ( 651 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To overcome the invalidation problem of Dempster rule with high conflict,a weighted combination method based on degree of credibility and certainty was proposed.Firstly,the cosine similarity was modified to hold the ability to measure the evidence conflict when multi-subset focal elements were included,followed by the building of evidence credibility model.Secondly,the evidence certainty model based on precision and entropy was presented,which can both reflect the evidence’s degree of multi-subset focal elements and the dispersion degree of probability assignment.Then the weighted coefficient was determined by credibility and certainty.Finally,the normalized weighted coefficient was used to average the basic probability assignment,and the final combination result can be obtained according to Dempster rule.Numerical examples show that,compared with other traditional weighted combination methods,the proposed approach has made better performance in reducing conflict and accelerating convergence.

    Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks
    Dong WANG,Yong-cheng LI,Bo BAI,Man-xi WANG
    2017, 38(1):  89-96.  doi:10.11959/j.issn.1000-436x.2017011
    Asbtract ( 404 )   HTML ( 2)   PDF (1140KB) ( 505 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The maximization problem of secure energy efficiency (EE) in decode-and-forward relay networks was investigated considering the power and energy constraints in physical-layer secure transmission.An iterative algorithm for power allocation was proposed based on fractional programming and DC (difference of convex functions) programming.This algorithm jointly allocated power for source and relay nodes to achieve energy-efficient secure transmission,subject to the peak power constraint of each node and the minimum secrecy rate requirement of the system.Simulation results demonstrate that the propose algorithm can improve the secure EE significantly compared with the conventional secrecy rate maximization strategy.

    Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
    Tao YIN,Shi-cong LI,Yu-peng TUO,Yong-zheng ZHANG
    2017, 38(1):  97-105.  doi:10.11959/j.issn.1000-436x.2017012
    Asbtract ( 523 )   HTML ( 5)   PDF (978KB) ( 917 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To defeat botnets and ensure cyberspace security,a novel social network-based botnet with strong destroy-resistance (DR-SNbot),as well as its corresponding countermeasure,was proposed.DR-SNbot constructed command and control servers (C&C-Servers) based on social network.Each C&C-Server corresponded to a unique pseudo-random nickname.The botmaster issues commanded by hiding them in diaries using information hiding techniques,and then a novel C&C channel was established.When different proportions of C&C-Servers were invalid,DR-SNbot would send out different levels of alarms to inform attackers to construct new C&C-Servers.Then,DR-SNbot could automatically repair C&C communication to ensure its strong destroy-resistance.Under the experimental settings,DR-SNbot could resume the C&C communication in a short period of time to keep 100% of the control rate even if all the current C&C-Servers were invalid.Finally,a botnet nickname detecting method was proposed based on the difference of lexical features of legal nicknames and pseudo-random nicknames.Experimental results show that the proposed method can effectively (precision:96.88%,recall:93%) detect pseudo-random nicknames generated by social network-based botnets with customized algorithms.

    Near-field localization algorithm of multiple sound sources based on approximated kernel density estimator
    Yu-zhuo FANG,Zhi-yong XU,Zhao ZHAO
    2017, 38(1):  106-116.  doi:10.11959/j.issn.1000-436x.2017013
    Asbtract ( 864 )   HTML ( 1)   PDF (3849KB) ( 730 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For near-field localization of multiple sound sources in reverberant environments,a algorithm model based on approximated kernel density estimator (KDE) was proposed.Multi-stage (MS) of sub-band processing was introduced to effectively solve the spatial aliasing by wide spacing.Spatial likelihood function (SLF) was built for multi-dimensional fusion by using two operators,sum (S) and prod (P).Then four algorithms,S-KDE,P-KDE,S-KDEMS,P-KDEMS,were derived.By the comprehensive comparison of the two statistical indicators root mean square error (RMSE) and percentage of SLF (PSLF) which denoted the recognition,P-KDEMS is confirmed as a near-field localization algorithm of multiple sound sources with high robustness and recognition.

    Nonlinear error modified equalization algorithm in high-order modulation of satellite communication
    Cheng-kai TANG,Ling-ling ZHANG,Bao-wang LIAN
    2017, 38(1):  117-125.  doi:10.11959/j.issn.1000-436x.2017014
    Asbtract ( 556 )   HTML ( 9)   PDF (1226KB) ( 1047 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the larger computation and the slower speed of nonlinear error compensation of traditional equalization algorithms,the fast nonlinear error equalization algorithm with amplitude and phase separation was constructed.It combined the feedback equalization to reduce the computational complexity respectively.In order to eliminate nonlinear interference and memory interference,the algorithm utilized the Volterra model to modify the error and it was adapted to update the feedback equalization parameters.The theoretical analysis and simulation compared proposed algorithm and existing conventional equalization algorithms from the bit error rate,convergence speed and computational complexity.The results show that the computational complexity is only equivalent to 14.1%~24.9% of other algorithms and proposed method can cancel the nonlinear interference quickly.

    Papers
    Performance assessment approach based on change-point detection for network moving target defense
    Cheng LEI,Duo-he MA,Hong-qi ZHANG,Ying-jie YANG,Miao WANG
    2017, 38(1):  126-140.  doi:10.11959/j.issn.1000-436x.2017015
    Asbtract ( 539 )   HTML ( 9)   PDF (1698KB) ( 1372 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A performance assessment approach based on change-point detection for network moving target defence was proposed.Directed to the problem of network resource graph not being able to present the effect of network resource vulnerabilities to network nodes,a conversion relationship between resource vulnerability changes and node security states was established by defining the concept of a hierarchical network resource graph and the efficiency of resource graph construction and updating were improved.Furthermore,directed to the problem of static detection algorithm not being able to precisely measure the dynamic change of network moving target defense,a change-point detection algorithm and standard degree measurement algorithm was designed.The security cost and benefit of network moving target defense in real-time and dynamically on the basis of unified metrics were defected and measured,which improved the evaluation accuracy.The analysis result of typical examples has proved the feasibility and the effectiveness of the proposed approach.

    Estimation and compensation for transmitter and receiver I/Q imbalance of full-duplex terminals
    Hao-wei WU,Jun-bo ZHAO,Hao-ran XU,Jing-lan OU
    2017, 38(1):  141-148.  doi:10.11959/j.issn.1000-436x.2017016
    Asbtract ( 475 )   HTML ( 7)   PDF (917KB) ( 832 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reduce I/Q imbalance of the full-duplex terminal with direct-conversion transceiver,an algorithm based on self-interference signal was proposed for the estimation and compensation of I/Q imbalance in both transmitter (Tx) and receiver (Rx).Without the perfect transmitter or receiver for I/Q imbalance estimation,the self-interference signal from Tx chain to Rx chain was used for parameter estimation and separation,and the Tx and Rx I/Q imbalance parameters were obtained,respectively.Then the pre-compensation before transmission and the correction after receiving was processed,so that there was nearly no I/Q imbalance in this full-duplex terminal from the view of the other terminals,and the complexity of the signal processing will be reduced as a result of the absent of the I/Q imbalance estimation.The simulation results show that the proposed algorithm can effectively estimate and compensate the I/Q imbalance of the full-duplex Tx & Rx terminal,and improve the overall signal quality and the system performance.

    Correspondences
    Sparse adaptive constant blind equalization algorithm for sparse multipath channel
    Si-yang MA,Hua PENG,Bin WANG
    2017, 38(1):  149-157.  doi:10.11959/j.issn.1000-436x.2017017
    Asbtract ( 501 )   HTML ( 2)   PDF (1418KB) ( 838 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the convergence rate of the blind equalizer for sparse multipath channel,a novel blind equalization approach called l0-norm constraint proportionate normalized least mean square constant algorithm was proposed for M-order phase-shift keying (MPSK) signal.Based on the constant modulus characteristics of MPSK signal and the sparse property of equalizer,a new blind equalization cost function with the l0-norm penalty on the equalizer tap coefficients was firstly constructed.Then the update formula of the tap coefficients was derived according to the gradient descent algorithm.Moreover,the iteration step was updated by drawing upon the normalized proportionate factor.The algorithm not only assigned step sizes proportionate to the magnitude of the current individual tap weights,but also attracted the inactive taps to zero adaptively.Theoretical analysis and simulation results show that the proposed algorithm outperforms the existing blind equalization algorithms for sparse channel in reducing ISI and improving convergence rate.

    Research on indoor localization algorithm based on kernel principal component analysis
    Hua-liang LI,Zhi-hong QIAN,Hong-liang TIAN
    2017, 38(1):  158-167.  doi:10.11959/j.issn.1000-436x.2017018
    Asbtract ( 607 )   HTML ( 10)   PDF (1074KB) ( 1052 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An indoor localization algorithm based on kernel principal component analysis (KPCA) was proposed.It applied KPCA to train the original location fingerprint (OLF) and extract the nonlinear feature of the OLF data at the offline stage,such that the information of all AP was more efficiently utilized.At the online stage,an improved weight k-nearest neighbor algorithm for positioning which could automatically choose neighbors was proposed.The experiments were carried out in a realistic WLAN environment.The results show that the algorithm outperforms the existing methods in terms of the mean error and localization accuracy.Moreover,it requires less times of RSS acquisition and AP number.

    Defense strategies selection based on attack-defense evolutionary game model
    Jian-ming HUANG,Heng-wei ZHANG,Jin-dong WANG,Shi-rui HUANG
    2017, 38(1):  168-176.  doi:10.11959/j.issn.1000-436x.2017019
    Asbtract ( 774 )   HTML ( 22)   PDF (1372KB) ( 1600 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.

    Study on mobile target real-time image registration based on improved SURF algorithm
    Gang JU,Liang YUAN,Xiao-yue LIU,Hao-en YUE
    2017, 38(1):  177-186.  doi:10.11959/j.issn.1000-436x.2017020
    Asbtract ( 570 )   HTML ( 3)   PDF (6693KB) ( 936 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the unstability of the real-time visual image characteristic point extraction and matching for the mobile target,an improved registration method of the multiple algorithm-fusion was introduced.Firstly,the method of bilateral filtering,Canny edge detection and morphological processing,was adopted to get the more robust image's edge map.And the founded points were limited in this edge map,then the Hessian matrix of SURF based on the discrete Gaussian-Hermite moment was modified.The character description vector was redefined in the algorithm.Following the above analysis,the Kendall coefficient constraint was discussed in image matching characteristic points.Secondly,the spectral radiant color invariant model and the I_SURF algorithm were used to match the real-time color image.Finally,the improved algorithm was combined with the update algorithm of adaptive target to match the mobile target in indoor environment.The experimental results show that the static image registration accuracy of the improved algorithm is higher than that of the SURF algorithm,and also the stability of the mobile image feature points extraction and the registration number have achieved over 97% under different rotating scales.

    Network security situation evaluation method for multi-step attack
    Hao-pu YANG,Hui QIU,Kun WANG
    2017, 38(1):  187-198.  doi:10.11959/j.issn.1000-436x.2017021
    Asbtract ( 592 )   HTML ( 22)   PDF (1046KB) ( 2115 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which was used to identify the attacker.Then the attack path and the attack phase were identified by causal correlation of every scene.Finally,combined with the attack phase as well as the threat index,the quantitative standard was established to evaluate the network security situation.The proposed method is assessed by two network attack-defense experiments,and the results illustrate accuracy and effectiveness of the method.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: