Most Download

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All
  • Most Downloaded in Recent Month
  • Most Downloaded in Recent Year

Please wait a minute...
  • Select all
    |
  • FEATURE TOPIC: RESILIENT SATELLITE COMMUNICATION NETWORKS TOWARDS HIGHLY DYNAMIC AND HIGHLY RELIABLE TRANSMISSION
    Shaojing Wang, Xiaomei Tang, Jing Lei, Chunjiang Ma, Chao Wen, Guangfu Sun
    China Communications. 2024, 21(2): 17-31. DOI: https://doi.org/10.23919/JCC.fa.2023-0229.202402

    Orthogonal Time Frequency and Space (OTFS) modulation is expected to provide high-speed and ultra-reliable communications for emerging mobile applications, including low-orbit satellite communications. Using the Doppler frequency for positioning is a promising research direction on communication and navigation integration. To tackle the high Doppler frequency and low signal-to-noise ratio (SNR) in satellite communication, this paper proposes a Red and Blue Frequency Shift Discriminator (RBFSD) based on the pseudo-noise (PN) sequence. The paper derives that the cross-correlation function on the Doppler domain exhibits the characteristic of a Sinc function. Therefore, it applies modulation onto the Delay-Doppler domain using PN sequence and adjusts Doppler frequency estimation by red-shifting or blue-shifting. Simulation results show that the performance of Doppler frequency estimation is close to the Cramér-Rao Lower Bound when the SNR is greater than -15dB. The proposed algorithm is about $1/D$ times less complex than the existing PN pilot sequence algorithm, where $D$ is the resolution of the fractional Doppler.

  • SECURITY SCHEMES AND SOLUTIONS
    ZHAO Bo, XIANG Shuang, AN Yang, TAO Wei
    China Communications. 2016, 13(1): 161-175.
    This paper analyzes the threat of TCG Software Stack (TSS)/TCM Service Module (TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism. In addition, this paper puts forward a dynamic priority task scheduling strategy based on value evaluation to handle this threat. The strategy is based on the implementation features of trusted hardware and establishes a multi-level ready queue. In this strategy, an algorithm for real-time value computing is also designed, and it can adjust the production curves of the real time value by setting parameters in different environment, thus enhancing its adaptability, which is followed by scheduling and algorithm description. This paper also implements the algorithm and carries out its performance optimization. Due to the experiment result from Intel NUC, it is shown that TSS based on advanced DPTSV is able to solve the problem of deadlock with no negative influence on performance and security in multi-user environment.
  • FEATURE TOPIC: RESILIENT SATELLITE COMMUNICATION NETWORKS TOWARDS HIGHLY DYNAMIC AND HIGHLY RELIABLE TRANSMISSION
    Haoran Xie, Yafeng Zhan, Jianhua Lu
    China Communications. 2024, 21(2): 1-16. DOI: https://doi.org/10.23919/JCC.fa.2023-0313.202402

    With the development of the transportation industry, the effective guidance of aircraft in an emergency to prevent catastrophic accidents remains one of the top safety concerns. Undoubtedly, operational status data of the aircraft play an important role in the judgment and command of the Operational Control Center (OCC). However, how to transmit various operational status data from abnormal aircraft back to the OCC in an emergency is still an open problem. In this paper, we propose a novel Telemetry, Tracking, and Command (TT&C) architecture named Collaborative TT&C (CoTT&C) based on mega-constellation to solve such a problem. CoTT&C allows each satellite to help the abnormal aircraft by sharing TT&C resources when needed, realizing real-time and reliable aeronautical communication in an emergency. Specifically, we design a dynamic resource sharing mechanism for CoTT&C and model the mechanism as a single-leader-multi-follower Stackelberg game. Further, we give an unique Nash Equilibrium (NE) of the game as a closed form. Simulation results demonstrate that the proposed resource sharing mechanism is effective, incentive compatible, fair, and reciprocal. We hope that our findings can shed some light for future research on aeronautical communications in an emergency.

  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Yuanjie Li, Jincheng Dai, Zhongwei Si, Kai Niu, Chao Dong, Jiaru Lin, Sen Wang, Yifei Yuan
    China Communications. 2022, 19(3): 70-87.
    Unsourced multiple access (UMA) is a multi-access technology for massive, low-power, uncoordinated, and unsourced Machine Type Communication (MTC) networks. It ensures transmission reliability under the premise of high energy efficiency. Based on the analysis of the 6G MTC key performance indicators (KPIs) and scenario characteristics, this paper summarizes its requirements for radio access networks. Following this, the existing multiple access models are analyzed under these standards to determine UMA's advantages for 6G MTC according to its design characteristics. The critical technology of UMA is the design of its multiple-access coding scheme. Therefore, the existing UMA coding schemes from different coding paradigms are further summarized and compared. In particular, this paper comprehensively considers the energy efficiency and computational complexity of these schemes, studies the changes of the above two indexes with the increase of access scale, and considers the trade-off between the two. It is revealed by the above analysis that some guiding rules of UMA coding design. Finally, the open problems and potentials in this field are given for future research.
  • SECURITY SCHEMES AND SOLUTIONS
    Thiruppathy Kesavan. V, Radhakrishnan. S
    China Communications. 2016, 13(6): 178-194.
    In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node’s average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.
  • NETWORKS & SECURITY
    Mengke Yang, Movahedipour Mahmood, Xiaoguang Zhou, Salam Shafaq, Latif Zahid
    China Communications. 2017, 14(10): 180-191.
    Intellectualization has become a new trend for telecom industry, driven by intelligent technology including cloud computing, big data, and Internet of things. In order to satisfy the service demand of intelligent logistics, this paper designed an intelligent logistics platform containing the main applications such as e-commerce, self-service transceiver, big data analysis, path location and distribution optimization. The intelligent logistics service platform has been built based on cloud computing to collect, store and handling multi-source heterogeneous mass data from sensors, RFID electronic tag, vehicle terminals and APP, so that the open-access cloud services including distribution, positioning, navigation, scheduling and other data services can be provided for the logistics distribution applications. And then the architecture of intelligent logistics cloud platform containing software layer (SaaS), platform layer (PaaS) and infrastructure (IaaS) has been constructed accordance with the core technology relative high concurrent processing technique, heterogeneous terminal data access, encapsulation and data mining. Therefore, intelligent logistics cloud platform can be carried out by the service mode for implementation to accelerate the construction of the symbiotic win-win logistics ecological system and the benign development of the ICT industry in the trend of intellectualization in China.
  • REVIEW PAPER
    Haotong Cao, Longxiang Yang, Zeyuan Liu, Mengting Wu
    China Communications. 2016, 13(6): 48-62.
    Network virtualization is an enabling technology of running multiple virtual networks on a shared substrate network. It aims to deal with the ossification of current network architecture. As a crucial component of network virtualization, virtual network embedding (VNE) can efficiently and effectively allocates the substrate resource to proposed virtual network requests. According to the optimization strategy, VNE approaches can be classified into three categories: exact, heuristic and meta-heuristic solution. The VNE exact solution is the foundation of its corresponding heuristic and meta-heuristic solutions. This paper presents a survey of existing typical VNE exact solutions, and open problems for the future research of VNE exact solutions are proposed.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Hongqi Zhang, Lu Zhang, Xianbin Yu
    China Communications. 2021, 18(5): 153-174.
    With the explosion of wireless data rates, the terahertz (THz) band (0.1-10 THz) is envisioned as a promising candidate to break the existing bandwidth bottleneck and satisfy the ever-increasing capacity demand. The THz wireless communications feature a number of attractive properties, such as potential terabit-per-second capacity and high energy efficiency. In this paper, an overview on the state-of-the-art THz communications is studied, with a special focus on key technologies of THz transceivers and THz communication systems. The recent progress on both electronic and photonic THz transmitters are presented, and then the THz receivers operating in direct- and heterodyne reception modes are individually surveyed. Based on the THz transceiver schemes, three kinds of THz wireless communication systems are reviewed, including solid-state electronic systems, photonics-assisted systems and all-photonics systems. The prospective key enabling technologies, corresponding challenges and research directions for lighting up high-speed THz communication systems are discussed as well.
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITE NETWORKS
    Peilong Liu, Hongyu Chen, Songjie Wei, Limin Li, Zhencai Zhu
    China Communications. 2018, 15(6): 28-41.
    To deal with the dynamic and imbalanced traffic requirements in Low Earth Orbit satellite networks, several distributed load balancing routing schemes have been proposed. However, because of the lack of global view, these schemes may lead to cascading congestion in regions with high volume of traffic. To solve this problem, a Hybrid-Traffic-Detour based Load Balancing Routing (HLBR) scheme is proposed, where a Long-Distance Traffic Detour (LTD) method is devised and coordinates with distributed traffic detour method to perform self-adaptive load balancing. The forwarding path of LTD is acquired by the Circuitous Multipath Calculation (CMC) based on prior geographical information, and activated by the LTD- Shift-Trigger (LST) through real-time congestion perception. Simulation results show that the HLBR can mitigate cascading congestion and achieve efficient traffic distribution.
  • Guest Editorial
    Xiaoyun Wang, Tao Sun, Xiaodong Duan, Dan Wang, Yongjing Li, Ming Zhao, Zhigang Tian
    China Communications. 2022, 19(1): 14-28.
    The Service-based Architecture (SBA) is one of the key innovations of 5G architecture that leverage modularized, self-contained and independent services to provide flexible and cloud-native 5G network. In this paper, SBA for Space-Air-Ground Integrated Network (SAGIN) is investigated to enable the 5G integration deployment. This paper proposes a novel Holistic Service-based Architecture (H-SBA) for SAGIN of 5G-Advanced and beyond, i.e., 6G. The H-SBA introduces the concept of end-to-end service-based architecture design. The “Network Function Service”, introduced in 5G SBA, is extended from Control Plane to User Plane, from core network to access network. Based on H-SBA, the new generation of protocol design is proposed, which proposes to use IETF QUIC and SRv6 to substitute 5G HTTP/2.0 and GTP-U. Testing results show that new protocols can achieve low latency and high throughput, making them promising candidate for H-SBA.
  • FEATURE TOPIC:COLLABORATIVE INTELLIGENCE FOR VEHICULAR INTERNET OF THINGS
    Xuting Duan, Hang Jiang, Daxin Tian, Tianyuan Zou, Jianshan Zhou, Yue Cao
    China Communications. 2021, 18(7): 1-12.
    In recent years, autonomous driving technology has made good progress, but the non-cooperative intelligence of vehicle for autonomous driving still has many technical bottlenecks when facing urban road autonomous driving challenges. V2I (Vehicle-to-Infrastructure) communication is a potential solution to enable cooperative intelligence of vehicles and roads. In this paper, the RGB-PVRCNN, an environment perception framework, is proposed to improve the environmental awareness of autonomous vehicles at intersections by leveraging V2I communication technology. This framework integrates vision feature based on PVRCNN. The normal distributions transform(NDT) point cloud registration algorithm is deployed both on onboard and roadside to obtain the position of the autonomous vehicles and to build the local map objects detected by roadside multi-sensor system are sent back to autonomous vehicles to enhance the perception ability of autonomous vehicles for benefiting path planning and traffic efficiency at the intersection. The field-testing results show that our method can effectively extend the environmental perception ability and range of autonomous vehicles at the intersection and outperform the PointPillar algorithm and the VoxelRCNN algorithm in detection accuracy.
  • REVIEW PAPER
    Renzhi Yuan, Jianshe Ma
    China Communications. 2016, 13(6): 63-75.
    With rapid advances of solar blind ultraviolet LED and ultraviolet detecting technology in recent years, ultraviolet communication gradually becomes a research hotspot due to its inherent advantages: low solar background noise, non-line-of-sight(NLOS) and good secrecy. The strong scattering characteristics in atmospheric render ultraviolet waveband the ideal choice for achieving NLOS optical communication. This paper reviews the research history and status of ultraviolet communication both in China and abroad, and especially introduces three main issues of ultraviolet communication: channel model, system analysis and design, light sources and detectors. For each aspect, current open issues and prospective research directions are analyzed.
  • SECURITY SCHEMES AND SOLUTIONS
    LI Wei, ZENG Xiaoyang, NAN Longmei, CHEN Tao, DAI Zibin
    China Communications. 2016, 13(1): 91-99.
    An Efficient and flexible implementation of block ciphers is critical to achieve information security processing. Existing implementation methods such as GPP, FPGA and cryptographic application-specific ASIC provide the broad range of support. However, these methods could not achieve a good tradeoff between high-speed processing and flexibility. In this paper, we present a reconfigurable VLIW processor architecture targeted at block cipher processing, analyze basic operations and storage characteristics, and propose the multi-cluster register-file structure for block ciphers. As for the same operation element of block ciphers, we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme. The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations, but also realizes dynamic configuration for cryptographic processing units. It has been implemented with 0.18µmCMOS technology, the test results show that the frequency can reach 350MHz, and power consumption is 420mw. Ten kinds of block and hash ciphers were realized in the processor. The encryption throughput of AES, DES, IDEA, and SHA-1 algorithm is 1554Mbps, 448Mbps, 785Mbps, and 424Mbps respectively, the test result shows that our processor’s encryption performance is significantly higher than other designs.
  • SERVICES AND APPLICATIONS
    Fengye Hu, Lu Wang, Shanshan Wang, Xiaolan Liu, Gengxin He
    China Communications. 2016, 13(8): 198-208.
    Human body posture recognition has attracted considerable attention in recent years in wireless body area networks (WBAN). In order to precisely recognize human body posture, many recognition algorithms have been proposed. However, the recognition rate is relatively low. In this paper, we apply back propagation (BP) neural network as a classifier to recognizing human body posture, where signals are collected from VG350 acceleration sensor and a posture signal collection system based on WBAN is designed. Human body signal vector magnitude (SVM) and tri-axial acceleration sensor data are used to describe the human body postures. We are able to recognize 4 postures: Walk, Run, Squat and Sit. Our posture recognition rate is up to 91.67%. Furthermore, we find an implied relationship between hidden layer neurons and the posture recognition rate. The proposed human body posture recognition algorithm lays the foundation for the subsequent applications.
  • Guest Editorial
    Min Sheng, Di Zhou, Weigang Bai, Junyu Liu, Jiandong Li
    China Communications. 2022, 19(1): 64-76.
    The rapid development and continuous updating of the mega satellite constellation (MSC) have brought new visions for the future 6G coverage extension, where the global seamless signal coverage can realize ubiquitous services for user terminals. However, global traffic demands present non-uniform characteristics. Therefore, how to ensure the on-demand service coverage for the specific traffic demand, i.e., the ratio of traffic density to service requirement per unit area, is the core issue of 6G wireless coverage extension exploiting the MSC. To this regard, this paper first discusses the open challenges to reveal the future direction of 6G wireless coverage extension from the perspective of key factors affecting service coverage performance, i.e., the network access capacity, space segment capacity and their matching-relationship. Furthermore, we elaborate on the key factors affecting effective matchings of the aforementioned aspects, thereby improving service coverage capability.
  • Guest Editorial
    Shilian Zheng, Linhui Ye, Xuanye Wang, Jinyin Chen, Huaji Zhou, Caiyi Lou, Zhijin Zhao, Xiaoniu Yang
    China Communications. 2021, 18(12): 94-107.
    The spectrum sensing model based on deep learning has achieved satisfying detection performence, but its robustness has not been verified. In this paper, we propose primary user adversarial attack (PUAA) to verify the robustness of the deep learning based spectrum sensing model. PUAA adds a carefully manufactured perturbation to the benign primary user signal, which greatly reduces the probability of detection of the spectrum sensing model. We design three PUAA methods in black box scenario. In order to defend against PUAA, we propose a defense method based on autoencoder named DeepFilter. We apply the long short-term memory network and the convolutional neural network together to DeepFilter, so that it can extract the temporal and local features of the input signal at the same time to achieve effective defense. Extensive experiments are conducted to evaluate the attack effect of the designed PUAA method and the defense effect of DeepFilter. Results show that the three PUAA methods designed can greatly reduce the probability of detection of the deep learning-based spectrum sensing model. In addition, the experimental results of the defense effect of DeepFilter show that DeepFilter can effectively defend against PUAA without affecting the detection performance of the model.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Pan Tang, Jianhua Zhang, Haoyu Tian, Zhaowei Chang, Jun Men, Yuxiang Zhang, Lei Tian, Liang Xia, Qixing Wang, Jingsuo He
    China Communications. 2021, 18(5): 19-32.
    Terahertz (THz) communication has been envisioned as a key enabling technology for sixth-generation (6G). In this paper, we present an extensive THz channel measurement campaign for 6G wireless communications from 220 GHz to 330 GHz. Furthermore, the path loss is analyzed and modeled by using two single-frequency path loss models and a multiple-frequencies path loss model. It is found that at most frequency points, the measured path loss is larger than that in the free space. But at around 310 GHz, the propagation attenuation is relatively weaker compared to that in the free space. Also, the frequency dependence of path loss is observed and the frequency exponent of the multiple-frequencies path loss model is 2.1. Moreover, the cellular performance of THz communication systems is investigated by using the obtained path loss model. Simulation results indicate that the current inter-site distance (ISD) for the indoor scenario is too small for THz communications. Furthermore, the tremendous capacity gain can be obtained by using THz bands compared to using microwave bands and millimeter wave bands. Generally, this work can give an insight into the design and optimization of THz communication systems for 6G.
  • BRAIN-COMPUTER-INTERFACE INSPIRED COMMUNICATIONS
    Xuelin Gu, Banghua Yang, Shouwei Gao, Honghao Gao, Linfeng Yan, Ding Xu, Wen Wang
    China Communications. 2022, 19(2): 62-72.
    After abusing drugs for long, drug users will experience deteriorated self-control cognitive ability, and poor emotional regulation. This paper designs a closed-loop virtual-reality (VR), motorimagery (MI) rehabilitation training system based on brain-computer interface (BCI) (MI-BCI+VR), aiming to enhance the self-control, cognition, and emotional regulation of drug addicts via personalized rehabilitation schemes. This paper is composed of two parts. In the first part, data of 45 drug addicts (mild: 15; moderate: 15; and severe: 15) is tested with electroencephalogram (EEG) and near-infrared spectroscopy (NIRS) equipment (EEG-NIRS) under the dual-mode, synchronous signal collection paradigm. Using these data sets, a dual-modal signal convolutional neural network (CNN) algorithm is then designed based on decision fusion to detect and classify the addiction degree. In the second part, the MIBCI+ VR rehabilitation system is designed, optimizing the Filter Bank Common Spatial Pattern (FBCSP) algorithm used in MI, and realizing MI-EEG intention recognition. Eight VR rehabilitation scenes are devised, achieving the communication between MI-BCI and VR scene models. Ten subjects are selected to test the rehabilitation system offline and online, and the test accuracy verifies the feasibility of the system. In future, it is suggested to develop personalized rehabilitation programs and treatment cycles based on the addiction degree.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Zheng Hu, Ping Zhang, Chunhong Zhang, Benhui Zhuang, Jianhua Zhang, Shangjing Lin, Tao Sun
    China Communications. 2022, 19(3): 16-35.
    Sixth Generation (6G) wireless communication network has been expected to provide global coverage, enhanced spectral efficiency, and AI(Artificial Intelligence)-native intelligence, etc. To meet these requirements, the computational concept of Decision-Making of cognition intelligence, its implementation framework adapting to foreseen innovations on networks and services, and its empirical evaluations are key techniques to guarantee the generation-agnostic intelligence evolution of wireless communication networks. In this paper, we propose an Intelligent Decision Making (IDM) framework, acting as the role of network brain, based on Reinforcement Learning modelling philosophy to empower autonomous intelligence evolution capability to 6G network. Besides, usage scenarios and simulation demonstrate the generality and efficiency of IDM. We hope that some of the ideas of IDM will assist the research of 6G network in a new or different light.
  • BRAIN-COMPUTER-INTERFACE INSPIRED COMMUNICATIONS
    Lu Jiang, Weihua Pei, Yijun Wang
    China Communications. 2022, 19(2): 1-14.
    A brain-computer interface (BCI) system based on steady-state visual evoked potentials (SSVEP) was developed by four-class phase-coded stimuli. SSVEPs elicited by flickers at 60Hz, which is higher than the critical fusion frequency (CFF), were compared with those at 15Hz and 30Hz. SSVEP components in electroencephalogram (EEG) were detected using task related component analysis (TRCA) method. Offline analysis with 17 subjects indicated that the highest information transfer rate (ITR) was 29.80±4.65bpm with 0.5s data length for 60Hz and the classification accuracy was 70.07±4.15%. The online BCI system reached an averaged classification accuracy of 87.75±3.50% at 60Hz with 4s, resulting in an ITR of 16.73±1.63bpm. In particular, the maximum ITR for a subject was 80bpm with 0.5s at 60Hz. Although the BCI performance of 60Hz was lower than that of 15Hz and 30Hz, the results of the behavioral test indicated that, with no perception of flicker, the BCI system with 60Hz was more comfortable to use than 15Hz and 30Hz. Correlation analysis revealed that SSVEP with higher signal-to-noise ratio (SNR) corresponded to better classification performance and the improvement in comfortableness was accompanied by a decrease in performance. This study demonstrates the feasibility and potential of a user-friendly SSVEP-based BCI using imperceptible flickers.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Meng Meng, Bo Hu, Shanzhi Chen, Jianyin Zhang
    China Communications. 2024, 21(2): 227-244. DOI: https://doi.org/10.23919/JCC.ja.2022-0605
    Lower Earth Orbit (LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO satellite communication system cannot meet the requirements of users when the satellite-terrestrial link is blocked by obstacles. To solve this problem, we introduce Intelligent reflect surface (IRS) for improving the achievable rate of terrestrial users in LEO satellite communication. We investigated joint IRS scheduling, user scheduling, power and bandwidth allocation (JIRPB) optimization algorithm for improving LEO satellite system throughput. The optimization problem of joint user scheduling and resource allocation is formulated as a non-convex optimization problem. To cope with this problem, the non-convex optimization problem is divided into resource allocation optimization sub-problem and scheduling optimization sub-problem firstly. Second, we optimize the resource allocation sub-problem via alternating direction multiplier method (ADMM) and scheduling sub-problem via Lagrangian dual method repeatedly. Third, we prove that the proposed resource allocation algorithm based ADMM approaches sublinear convergence theoretically. Finally, we demonstrate that the proposed JIRPB optimization algorithm improves the LEO satellite communication system throughput.
  • Guest Editorial
    Zhendong Mao, Mugen Peng, Xiqing Liu
    China Communications. 2021, 18(3): 29-38.
    Reconfigurable intelligent surface (RIS) can manipulate the wireless propagation environment by smartly adjusting the amplitude/phase in a programmable panel, enjoying the improved performance. The accurate acquisition of the instantaneous channel state information (CSI) in the cascaded RIS chain makes an indispensable contribution to the performance gains. However, it is quite challenging to estimate the CSI in a time-variant scenario due to the limited signal processing capability of the passive elements embedded in a RIS pannel. In this work, a channel estimation scheme for the RIS-assisted wireless communication system is proposed, which is demonstrated to perform well in a time-variant scenario. The cascaded RIS channel is modeled as a state-space model based upon the mobility situations. In addition, to fully exploit the time correlation of channel, Kalman filter is employed by taking the prior information of channels into account. Further, the optimal reflection coefficients are derived according to the minimum mean square error (MMSE) criterion. Numerical results show that the proposed methods exhibit superior performance if compared with a conventional channel estimation scheme.
  • SECURITY SCHEMES AND SOLUTIONS
    LIU Lizhao, LIU Jian, DAI Yaomei, XU Huarong, YIN Huayi, ZHU Shunzhi
    China Communications. 2016, 13(1): 100-112.
    Many websites use verification codes to prevent users from using the machine automatically to register, login, malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually. Improving the verification code security system needs the identification method as the corresponding testing system. We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom, design a multi-step anisotropic verification code identification algorithm which includes core procedure ofbuilding anisotropic heat kernel, settingwave energy information parameters, combing outverification codecharacters and corresponding peripheral procedure of gray scaling, binarizing, denoising, normalizing, segmenting and identifying, give out the detail criterion and parameter set. Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters, mathematical, chinese, voice, 3D, programming, video, advertising, it has a higher rate of 25% and 50% than neural network and context matching algorithm separately for Yahoo site, 49% and 60% for Captcha site, 20% and 52% for Baidu site, 60% and 65% for 3DTakers site, 40% and 51% for MDP site.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Shanyun Liu, Xianbin Yu, Rongbin Guo, Yajie Tang, Zhifeng Zhao
    China Communications. 2021, 18(5): 33-49.
    For the sake of meeting the demand of data rates at terabit (Tbit) per second scale in future networks, the terahertz (THz) band is widely accepted as one of the potential key enabling technologies for next generation wireless communication systemsWith the progressive development of THz devices, regrading THz communications at system level is increasing crucial and captured the interest of plenty of researchersWithin this scope, THz channel modeling serves as an indispensable and fundamental elementBy surveying the latest literature findings, this paper reviews the problem of channel modeling in the THz band, with an emphasis on molecular absorption loss, misalignment fading and multipath fading, which are major influence factors in the THz channel modelingThen, we focus on simulators and experiments in the THz band, after which we give a brief introduction on applications of THz channel models with respects to capacity, security, and sensing as examplesFinally, we discuss some key issues in the future THz channel modeling.
  • Shu Fu, Bibo Wu, Shaohua Wu, Fang Fang
    China Communications. 2021, 18(9): 24-36.
    The six-generation (6G) wireless network is expected to satisfy the requirements of ubiquitous connectivity and intelligent endogenous. Terrestrial-satellite networks (TSN) enable seamless coverage for terrestrial users in a wide area, making it very promising in 6G. As data traffic in TSNs surges, the integrated management for caching, computing, and communication (3C) has attracted much research attention. In this paper, we investigate the multi-resource management in the uplink and downlink transmission of TSN, respectively. In particularly, we aim to guarantee both throughput fairness and data security in the uplink transmission of TSN. Considering the intermittent communication of the satellite, we introduce two kinds of relays, i.e., terrestrial relays (TRs) and aerial relays (ARs) to improve the system throughput performance in the downlink transmission of TSN. Finally, we study a specific case of TSN with the uplink and downlink transmission, and the corresponding simulation results validate the effectiveness of our proposed schemes.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Xiaofeng Zhong, Chenchen Fan, Shidong Zhou
    China Communications. 2022, 19(3): 145-157.
    Compared with wired communication, the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature. To prevent eavesdropping, many researches on transmission techniques or cryptographic methods are carried out. This paper proposes a new index parameter named as eavesdropping area, to evaluate the anti-eavesdropping performance of wireless system. Given the locations of legitimate transmitter and receiver, eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region. This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification. Corresponding key system parameters are analyzed, including the characteristics of eavesdropping region, transmitted beam pattern, beam direction, receiver sensitivity, eavesdropping sensitivity, path loss exponent and so on. The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability.
  • FEATURE TOPIC: RESILIENT SATELLITE COMMUNICATION NETWORKS TOWARDS HIGHLY DYNAMIC AND HIGHLY RELIABLE TRANSMISSION
    Ning Yang, Heng Wang, Jingming Hu, Bangning Zhang, Daoxing Guo, Yuan Liu
    China Communications. 2024, 21(2): 32-48. DOI: https://doi.org/10.23919/JCC.fa.2023-0424.202402

    In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing (MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good (BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework.

  • FEATURE TOPIC: RESILIENT SATELLITE COMMUNICATION NETWORKS TOWARDS HIGHLY DYNAMIC AND HIGHLY RELIABLE TRANSMISSION
    Qingmiao Zhang, Lidong Zhu, Yanyan Chen, Shan Jiang
    China Communications. 2024, 21(2): 49-58. DOI: https://doi.org/10.23919/JCC.fa.2023-0454.202402

    As the demands of massive connections and vast coverage rapidly grow in the next wireless communication networks, rate splitting multiple access (RSMA) is considered to be the new promising access scheme since it can provide higher efficiency with limited spectrum resources. In this paper, combining spectrum splitting with rate splitting, we propose to allocate resources with traffic offloading in hybrid satellite terrestrial networks. A novel deep reinforcement learning method is adopted to solve this challenging non-convex problem. However, the never-ending learning process could prohibit its practical implementation. Therefore, we introduce the switch mechanism to avoid unnecessary learning. Additionally, the QoS constraint in the scheme can rule out unsuccessful transmission. The simulation results validates the energy efficiency performance and the convergence speed of the proposed algorithm.

  • WIRELESS COMMUNICATIONS
    Xiaorong Zhu, Mengrong Li, Wenchao Xia, Hongbo Zhu
    China Communications. 2016, 13(8): 136-147.
    In this paper, we propose a novel speed and service-sensitive handoff algorithm and analytical model for hierarchical cellular networks. First, we use the Gauss-Markov mobility model to predict the speeds of mobile stations, and divide mobile stations into three classes based on the predicted speeds: fast, medium-speed, and slow. Then, according to the mobility classification, network conditions, and service types, mobile stations will be handoff to the proper target networks prior to the deterioration of the currently operating channel. We further develop an analytical model to evaluate the performance of such a hierarchical system with different speed classes and service types. Simulations and analytical results show that the proposed handoff algorithm can significantly improve the network performance in terms of the handoff failure probability, unnecessary handoff probability, and network throughput, comparing with the traditional algorithms.
  • FEATURE TOPIC:COLLABORATIVE INTELLIGENCE FOR VEHICULAR INTERNET OF THINGS
    Shiyi Wang, Yong Liao
    China Communications. 2021, 18(7): 36-43.
    With the rapid development of the Internet of vehicles (IoV), vehicle to everything (V2X) has strict requirements for ultra-reliable and low latency communications (URLLC), and massive multi-input multi-output (MIMO) channel state information (CSI) feedback can effectively support URLLC communication in 5G vehicle to infrastructure (V2I) scenarios. Existing research applies deep learning (DL) to CSI feedback, but most of its algorithms are based on low-speed outdoor or indoor environments and assume that the feedback link is perfect. However, the actual channel still has the influence of additive noise and nonlinear effects, especially in the high-speed V2I scene, the channel characteristics are more complex and time-varying. In response to the above problems, this paper proposes a CSI intelligent feedback network model for V2I scenarios, named residual mix-net (RM-Net). The network learns the channel characteristics in the V2I scenario at the vehicle user (User Equipment, UE), compresses the CSI and sends it to the channel; the roadside base station (Base Station, BS) receives the data and learns the compressed data characteristics, and then restore the original CSI. The system simulation results show that the RM-Net training speed is fast, requires fewer training samples, and its performance is significantly better than the existing DL-based CSI feedback algorithm. It can learn channel characteristics in high-speed mobile V2I scenarios and overcome the influence of additive noise. At the same time, the network still has good performance under high compression ratio and low signal-to-noise ratio (SNR).
  • Runze Dong, Buhong Wang, Kunrui Cao
    China Communications. 2021, 18(9): 71-87.
    The high mobility of unmanned aerial vehicles (UAVs) could bring abundant degrees of freedom for the design of wireless communication systems, which results in that UAVs, especially UAV swarm, have attracted considerable attention. This paper considers a UAV Swarm enabled relaying communication system, where multiple UAV relays are organized via coordinated multiple points (CoMP) as a UAV swarm to enhance physical layer security of the system in the presence of an eavesdropper. In order to maximize achievable secrecy rate of downlink, we jointly optimize the beamforming vector of the virtual array shaped by the UAV swarm and bandwidth allocation on it for receiving and forwarding, and both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered on the UAV swarm. Due to the non-convexity of the joint optimization problem, we propose an alternating optimization (AO) algorithm to decompose it into two subproblems utilizing block coordinate descent technique, then each subproblem is solved by successive convex optimization method. Simulation results demonstrate that DF has competitive performance advantage compared with AF and the superiority of the proposed secure transmission strategy with optimal beamforming and bandwidth allocation compared with benchmark strategies.
  • Guest Editorial
    Ziying Wu, Danfeng Yan
    China Communications. 2021, 18(11): 26-41.
    Multi-access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional Internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based vehicle-aware Multi-access Edge Computing network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.
  • Guest Editorial
    Qihui Wu, Min Zhang, Chao Dong, Yong Feng, Yanli Yuan, Simeng Feng, Tony Q. S. Quek
    China Communications. 2022, 19(1): 186-201.
    In recent years, with the growth in Unmanned Aerial Vehicles (UAVs), UAV-based systems have become popular in both military and civil applications.In these scenarios, the lack of reliable communication infrastructure has motivated UAVs to establish a network as flying nodes, also known as Flying Ad Hoc Networks (FANETs).However, in FANETs, the high mobility degree of flying and terrestrial users may be responsible for constant changes in the network topology, making end-to-end connections in FANETs challenging.Mobility estimation and prediction of UAVs can address the challenge mentioned above since it can provide better routing planning and improve overall FANET performance in terms of continuous service availability.We thus develop a Software Defined Network (SDN)-based heterogeneous architecture for reliable communication in FANETs.In this architecture, we apply an Extended Kalman Filter (EKF) for accurate mobility estimation and prediction of UAVs.In particular, we formulate the routing problem in SDN-based Heterogeneous FANETs as a graph decision problem.As the problem is NP-hard, we further propose a Directional Particle Swarming Optimization (DPSO) approach to solve it.The extensive simulation results demonstrate that the proposed DPSO routing can exhibit superior performance in improving the goodput, packet delivery ratio, and delay.
  • BRAIN-COMPUTER-INTERFACE INSPIRED COMMUNICATIONS
    Yuang Li, Yong Ge, Xuefei Zhong, Xiong Zhang
    China Communications. 2022, 19(2): 15-30.
    Steady-state visual evoked potential (SSVEP) has become a powerful tool for Brain Computer Interface (BCI) because of its high signal-tonoise ratio, high information transmission rate,and minimal user training.At present, the edge information of each region cannot be identified in spatial coding based on SSVEP-BCI technology, and the user experience is poor. To solve this problem, this paper designed a new paradigm to explore the relationship between the fixation point position of continuous sliding and the correlation coefficient ratio in the dualfrequency case. Firstly, the standard sinusoidal signal was employed to simulate the Electroencephalogram (EEG) signal, which verified the reliability of characterizing the amplitude variation of test signal by correlation coefficient.Then, the relationship between the amplitude response of SSVEP and the distance between the fixation point and the stimulus in the horizontal direction was tested by Canonical Correlation Analysis (CCA) and Filter bank CCA (FBCCA). Finally, the experimental data were offline analyzed under the condition of continuous sliding of the fixation point. It is feasible and reasonable to detect the amplitude change of frequency component in SSVEP by utilizing the spatial coding method in this paper to improve the extraction accuracy of spatial information.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Na Li, Guangyi Liu, Huimin Zhang, Quan Zhao, Yun Zhao, Zhou Tong, Yingying Wang, Junshuai Sun
    China Communications. 2022, 19(3): 1-15.
    The convergence of information, communication, and data technologies (ICDT) has been identified as one of the developing trends of the sixth generation(6G) network. Service-based architecture (SBA) as one of the promising information technology, has been preliminarily introduced into the fifth generation (5G) core network (CN) and successfully commercialized, which verifies its feasibility and effectiveness. However, SBA mainly focuses on the control plane of CN at present and the SBA-CN user plane is being studied by the industry. In addition to further evolving the SBA-CN, SBA radio access network (RAN) should also be considered to enable an end-toend SBA, so as to meet more comprehensive and extreme requirements of future applications, as well as support fast rollout requirements of RAN devices.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Yanfei Dong, Jincheng Dai, Kai Niu, Sen Wang, Yifei Yuan
    China Communications. 2022, 19(3): 101-115.
    In order to provide ultra low-latency and high energy-efficient communication for intelligences, the sixth generation (6G) wireless communication networks need to break out of the dilemma of the depleting gain of the separated optimization paradigm. In this context, this paper provides a comprehensive tutorial that overview how joint source-channel coding (JSCC) can be employed for improving overall system performance. For the purpose, we first introduce the communication requirements and performance metrics for 6G. Then, we provide an overview of the source-channel separation theorem and why it may not hold in practical applications. In addition, we focus on two new JSCC schemes called the double low-density parity-check (LDPC) codes and the double polar codes, respectively, giving their detailed coding and decoding processes and corresponding performance simulations. In a nutshell, this paper constitutes a tutorial on the JSCC scheme tailored to the needs of future 6G communications.
  • SECURITY SCHEMES AND SOLUTIONS
    SHI Wenchang, ZHAO Fei, QIN Bo, LIANG Bin
    China Communications. 2016, 13(1): 139-149.
    Copy-Move Forgery (CMF) is one of the simple and effective operations to create forged digital images. Recently, techniques based on Scale Invariant Features Transform (SIFT) are widely used to detect CMF. Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance. However, for some CMF images, these approaches cannot produce satisfactory detection results. For instance, the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result. Sometimes these approaches may even produce error results. According to our observations, one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences. These values are only applicable to a few images, which limits their application. To solve the problem, a novel approach named as CMF Detection with Particle Swarm Optimization (CMFD-PSO) is proposed in this paper. CMFD-PSO integrates the Particle Swarm Optimization (PSO) algorithm into the SIFT-based framework. It utilizes the PSO algorithm to generate customized parameter values for images, which are used for CMF detection under the SIFT-based framework. Experimental results show that CMFD-PSO has good performance.
  • NETWORKS & SECURITY
    Gang Lu, Ronghua Guo, Ying Zhou, Jing Du
    China Communications. 2018, 15(6): 125-138.
    Machine Learning (ML) techniques have been widely applied in recent traffic classification. However, the problems of both discriminator bias and class imbalance decrease the accuracies of ML based traffic classifier. In this paper, we propose an accurate and extensible traffic classifier. Specifically, to address the discriminator bias issue, our classifier is built by making an optimal cascade of binary sub-classifiers, where each binary sub-classifier is trained independently with the discriminators used for identifying application specific traffic. Moreover, to balance a training dataset, we apply SMOTE algorithm in generating artificial training samples for minority classes. We evaluate our classifier on two datasets collected from different network border routers. Compared with the previous multi-class traffic classifiers built in one-time training process, our classifier achieves much higher F-Measure and AUC for each application.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Ke Guan, Haofan Yi, Danping He, Bo Ai, Zhangdui Zhong
    China Communications. 2021, 18(5): 1-18.
    Terahertz (THz) communications are envisioned as a key technology for the sixth-generation wireless communication system (6G). However, it is not practical to perform large-scale channel measurements with high degrees of freedom at THz frequency band. This makes empirical or stochastic modeling approaches relying on measurements no longer stand. In order to break through the bottleneck of scarce full-dimensional channel sounding measurements, this paper presents a novel paradigm for THz channel modeling towards 6G. With the core of high-performance ray tracing (RT), the presented paradigm requires merely quite limited channel sounding to calibrate the geometry and material electromagnetic (EM) properties of the three-dimensional (3D) environment model in the target scenarios. Then, through extensive RT simulations, the parameters extracted from RT simulations can be fed into either ray-based novel stochastic channel models or cluster-based standard channel model families. Verified by RT simulations, these models can generate realistic channels that are valuable for the design and evaluation of THz systems. Representing two ends of 6G THz use cases from microscopy to macroscopy, case studies are made for close-proximity communications, wireless connections on a desktop, and smart rail mobility, respectively. Last but not least, new concerns on channel modeling resulting from distinguishing features of THz wave are discussed regarding propagation, antenna array, and device aspects, respectively.
  • Guest Editorial
    Kang Liu, Wei Quan, Deyun Gao, Chengxiao Yu, Mingyuan Liu, Yuming Zhang
    China Communications. 2021, 18(8): 62-74.
    Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission. However, realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of network link states. To this end, this paper proposes a distributed asynchronous deep reinforcement learning framework to intensify the dynamics and prediction of adaptive packet scheduling. Our framework contains two parts: local asynchronous packet scheduling and distributed cooperative control center. In local asynchronous packet scheduling, an asynchronous prioritized replay double deep Q-learning packets scheduling algorithm is proposed for dynamic adaptive packet scheduling learning, which makes a combination of prioritized replay double deep Q-learning network (P-DDQN) to make the fitting analysis. In distributed cooperative control center, a distributed scheduling learning and neural fitting acceleration algorithm to adaptively update neural network parameters of P-DDQN for more precise packet scheduling. Experimental results show that our solution has a better performance than Random weight algorithm and Round--Robin algorithm in throughput and loss ratio. Further, our solution has 1.32 times and 1.54 times better than Random weight algorithm and Round--Robin algorithm on the stability of multipath data transmission, respectively.