Most Download

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All
  • Most Downloaded in Recent Month
  • Most Downloaded in Recent Year

Please wait a minute...
  • Select all
    |
  • SECURITY SCHEMES AND SOLUTIONS
    ZHAO Bo, XIANG Shuang, AN Yang, TAO Wei
    China Communications. 2016, 13(1): 161-175.
    This paper analyzes the threat of TCG Software Stack (TSS)/TCM Service Module (TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism. In addition, this paper puts forward a dynamic priority task scheduling strategy based on value evaluation to handle this threat. The strategy is based on the implementation features of trusted hardware and establishes a multi-level ready queue. In this strategy, an algorithm for real-time value computing is also designed, and it can adjust the production curves of the real time value by setting parameters in different environment, thus enhancing its adaptability, which is followed by scheduling and algorithm description. This paper also implements the algorithm and carries out its performance optimization. Due to the experiment result from Intel NUC, it is shown that TSS based on advanced DPTSV is able to solve the problem of deadlock with no negative influence on performance and security in multi-user environment.
  • REVIEW PAPER
    Renzhi Yuan, Jianshe Ma
    China Communications. 2016, 13(6): 63-75.
    With rapid advances of solar blind ultraviolet LED and ultraviolet detecting technology in recent years, ultraviolet communication gradually becomes a research hotspot due to its inherent advantages: low solar background noise, non-line-of-sight(NLOS) and good secrecy. The strong scattering characteristics in atmospheric render ultraviolet waveband the ideal choice for achieving NLOS optical communication. This paper reviews the research history and status of ultraviolet communication both in China and abroad, and especially introduces three main issues of ultraviolet communication: channel model, system analysis and design, light sources and detectors. For each aspect, current open issues and prospective research directions are analyzed.
  • SERVICES AND APPLICATIONS
    Danfeng Yan, Guang Zhou, Xuan Zhao, Yuan Tian, Fangchun Yang
    China Communications. 2016, 13(8): 244-257.
    Some research work has showed that public mood and stock market price have some relations in some degree. Although it is difficult to clear the relation, the research about the relation between stock market price and public mood is interested by some scientists. This paper tries to find the relationship between Chinese stock market and Chinese local Microblog. First, C-POMS (Chinese Profile of Mood States) was proposed to analyze sentiment of Microblog feeds. Then Granger causality test confirmed the relation between C-POMS analysis and price series. SVM and Probabilistic Neural Network were used to make prediction, and experiments show that SVM is better to predict stock market movements than Probabilistic Neural Network. Experiments also indicate that adding certain dimension of C-POMS as the input data will improve the prediction accuracy to 66.667%. Two dimensions to input data leads to the highest accuracy of 71.429%, which is about 20% higher than using only history stock data as the input data. This paper also compared the proposed method with the ROSTEA scores, and concluded that only the proposed method brings more accurate predicts.
  • Guest Editorial
    Yuanzhi He, Biao Sheng, Hao Yin, Di Yan, Yingchao Zhang
    China Communications. 2022, 19(1): 77-91.
    Resource allocation is an important problem influencing the service quality of multi-beam satellite communications. In multi-beam satellite communications, the available frequency bandwidth is limited, users requirements vary rapidly, high service quality and joint allocation of multi-dimensional resources such as time and frequency are required. It is a difficult problem needs to be researched urgently for multi-beam satellite communications, how to obtain a higher comprehensive utilization rate of multi-dimensional resources, maximize the number of users and system throughput, and meet the demand of rapid allocation adapting dynamic changed the number of users under the condition of limited resources, with using an efficient and fast resource allocation algorithm. In order to solve the multi-dimensional resource allocation problem of multi-beam satellite communications, this paper establishes a multi-objective optimization model based on the maximum the number of users and system throughput joint optimization goal, and proposes a multi-objective deep reinforcement learning based time-frequency two-dimensional resource allocation (MODRL-TF) algorithm to adapt dynamic changed the number of users and the timeliness requirements. Simulation results show that the proposed algorithm could provide higher comprehensive utilization rate of multi-dimensional resources, and could achieve multi-objective joint optimization, and could obtain better timeliness than traditional heuristic algorithms, such as genetic algorithm (GA) and ant colony optimization algorithm (ACO).
  • Guest Editorial
    Xiaoyun Wang, Tao Sun, Xiaodong Duan, Dan Wang, Yongjing Li, Ming Zhao, Zhigang Tian
    China Communications. 2022, 19(1): 14-28.
    The Service-based Architecture (SBA) is one of the key innovations of 5G architecture that leverage modularized, self-contained and independent services to provide flexible and cloud-native 5G network. In this paper, SBA for Space-Air-Ground Integrated Network (SAGIN) is investigated to enable the 5G integration deployment. This paper proposes a novel Holistic Service-based Architecture (H-SBA) for SAGIN of 5G-Advanced and beyond, i.e., 6G. The H-SBA introduces the concept of end-to-end service-based architecture design. The “Network Function Service”, introduced in 5G SBA, is extended from Control Plane to User Plane, from core network to access network. Based on H-SBA, the new generation of protocol design is proposed, which proposes to use IETF QUIC and SRv6 to substitute 5G HTTP/2.0 and GTP-U. Testing results show that new protocols can achieve low latency and high throughput, making them promising candidate for H-SBA.
  • SECURITY SCHEMES AND SOLUTIONS
    LIU Lizhao, LIU Jian, DAI Yaomei, XU Huarong, YIN Huayi, ZHU Shunzhi
    China Communications. 2016, 13(1): 100-112.
    Many websites use verification codes to prevent users from using the machine automatically to register, login, malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually. Improving the verification code security system needs the identification method as the corresponding testing system. We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom, design a multi-step anisotropic verification code identification algorithm which includes core procedure ofbuilding anisotropic heat kernel, settingwave energy information parameters, combing outverification codecharacters and corresponding peripheral procedure of gray scaling, binarizing, denoising, normalizing, segmenting and identifying, give out the detail criterion and parameter set. Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters, mathematical, chinese, voice, 3D, programming, video, advertising, it has a higher rate of 25% and 50% than neural network and context matching algorithm separately for Yahoo site, 49% and 60% for Captcha site, 20% and 52% for Baidu site, 60% and 65% for 3DTakers site, 40% and 51% for MDP site.
  • REVIEW PAPER
    Haotong Cao, Longxiang Yang, Zeyuan Liu, Mengting Wu
    China Communications. 2016, 13(6): 48-62.
    Network virtualization is an enabling technology of running multiple virtual networks on a shared substrate network. It aims to deal with the ossification of current network architecture. As a crucial component of network virtualization, virtual network embedding (VNE) can efficiently and effectively allocates the substrate resource to proposed virtual network requests. According to the optimization strategy, VNE approaches can be classified into three categories: exact, heuristic and meta-heuristic solution. The VNE exact solution is the foundation of its corresponding heuristic and meta-heuristic solutions. This paper presents a survey of existing typical VNE exact solutions, and open problems for the future research of VNE exact solutions are proposed.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Pan Tang, Jianhua Zhang, Haoyu Tian, Zhaowei Chang, Jun Men, Yuxiang Zhang, Lei Tian, Liang Xia, Qixing Wang, Jingsuo He
    China Communications. 2021, 18(5): 19-32.
    Terahertz (THz) communication has been envisioned as a key enabling technology for sixth-generation (6G). In this paper, we present an extensive THz channel measurement campaign for 6G wireless communications from 220 GHz to 330 GHz. Furthermore, the path loss is analyzed and modeled by using two single-frequency path loss models and a multiple-frequencies path loss model. It is found that at most frequency points, the measured path loss is larger than that in the free space. But at around 310 GHz, the propagation attenuation is relatively weaker compared to that in the free space. Also, the frequency dependence of path loss is observed and the frequency exponent of the multiple-frequencies path loss model is 2.1. Moreover, the cellular performance of THz communication systems is investigated by using the obtained path loss model. Simulation results indicate that the current inter-site distance (ISD) for the indoor scenario is too small for THz communications. Furthermore, the tremendous capacity gain can be obtained by using THz bands compared to using microwave bands and millimeter wave bands. Generally, this work can give an insight into the design and optimization of THz communication systems for 6G.
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITE NETWORKS
    Peilong Liu, Hongyu Chen, Songjie Wei, Limin Li, Zhencai Zhu
    China Communications. 2018, 15(6): 28-41.
    To deal with the dynamic and imbalanced traffic requirements in Low Earth Orbit satellite networks, several distributed load balancing routing schemes have been proposed. However, because of the lack of global view, these schemes may lead to cascading congestion in regions with high volume of traffic. To solve this problem, a Hybrid-Traffic-Detour based Load Balancing Routing (HLBR) scheme is proposed, where a Long-Distance Traffic Detour (LTD) method is devised and coordinates with distributed traffic detour method to perform self-adaptive load balancing. The forwarding path of LTD is acquired by the Circuitous Multipath Calculation (CMC) based on prior geographical information, and activated by the LTD- Shift-Trigger (LST) through real-time congestion perception. Simulation results show that the HLBR can mitigate cascading congestion and achieve efficient traffic distribution.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Yanfei Dong, Jincheng Dai, Kai Niu, Sen Wang, Yifei Yuan
    China Communications. 2022, 19(3): 101-115.
    In order to provide ultra low-latency and high energy-efficient communication for intelligences, the sixth generation (6G) wireless communication networks need to break out of the dilemma of the depleting gain of the separated optimization paradigm. In this context, this paper provides a comprehensive tutorial that overview how joint source-channel coding (JSCC) can be employed for improving overall system performance. For the purpose, we first introduce the communication requirements and performance metrics for 6G. Then, we provide an overview of the source-channel separation theorem and why it may not hold in practical applications. In addition, we focus on two new JSCC schemes called the double low-density parity-check (LDPC) codes and the double polar codes, respectively, giving their detailed coding and decoding processes and corresponding performance simulations. In a nutshell, this paper constitutes a tutorial on the JSCC scheme tailored to the needs of future 6G communications.
  • SERVICES AND APPLICATIONS
    Xiaolin Gui, Jun Liu, Mucong Chi, Chenyu Li, Zhenming Lei
    China Communications. 2016, 13(8): 209-221.
    Security and privacy issues are magnified by velocity, volume, and variety of big data. User’s privacy is an even more sensitive topic attracting most people’s attention. While XcodeGhost, a malware of iOS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined XcodeGhost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million iPhone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of XcodeGhost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most XcodeGhost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model.
  • BRAIN-COMPUTER-INTERFACE INSPIRED COMMUNICATIONS
    Lu Jiang, Weihua Pei, Yijun Wang
    China Communications. 2022, 19(2): 1-14.
    A brain-computer interface (BCI) system based on steady-state visual evoked potentials (SSVEP) was developed by four-class phase-coded stimuli. SSVEPs elicited by flickers at 60Hz, which is higher than the critical fusion frequency (CFF), were compared with those at 15Hz and 30Hz. SSVEP components in electroencephalogram (EEG) were detected using task related component analysis (TRCA) method. Offline analysis with 17 subjects indicated that the highest information transfer rate (ITR) was 29.80±4.65bpm with 0.5s data length for 60Hz and the classification accuracy was 70.07±4.15%. The online BCI system reached an averaged classification accuracy of 87.75±3.50% at 60Hz with 4s, resulting in an ITR of 16.73±1.63bpm. In particular, the maximum ITR for a subject was 80bpm with 0.5s at 60Hz. Although the BCI performance of 60Hz was lower than that of 15Hz and 30Hz, the results of the behavioral test indicated that, with no perception of flicker, the BCI system with 60Hz was more comfortable to use than 15Hz and 30Hz. Correlation analysis revealed that SSVEP with higher signal-to-noise ratio (SNR) corresponded to better classification performance and the improvement in comfortableness was accompanied by a decrease in performance. This study demonstrates the feasibility and potential of a user-friendly SSVEP-based BCI using imperceptible flickers.
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITE NETWORKS
    Xiangming Meng, Sheng Wu, Michael Riis Andersen, Jiang Zhu, Zuyao Ni
    China Communications. 2018, 15(6): 1-17.
    Due to limited volume, weight and power consumption, micro-satellite has to reduce data transmission and storage capacity by image compression when performs earth observation missions. However, the quality of images may be unsatisfied. This paper considers the problem of recovering sparse signals by exploiting their unknown sparsity pattern. To model structured sparsity, the prior correlation of the support is encoded by imposing a transformed Gaussian process on the spike and slab probabilities. Then, an efficient approximate message-passing algorithm with structured spike and slab prior is derived for posterior inference, which, combined with a fast direct method, reduces the computational complexity significantly. Further, a unified scheme is developed to learn the hyperparameters using expectation maximization (EM) and Bethe free energy optimization. Simulation results on both synthetic and real data demonstrate the superiority of the proposed algorithm.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Zhi Chen, Xinying Ma, Chong Han, Qiye Wen
    China Communications. 2021, 18(5): 93-119.
    Terahertz (THz) communications have been widely envisioned as a promising enabler to provide adequate bandwidth and achieve ultra-high data rates for sixth generation (6G) wireless networks. In order to mitigate blockage vulnerability caused by serious propagation attenuation and poor diffraction of THz waves, an intelligent reflecting surface (IRS), which manipulates the propagation of incident electromagnetic waves in a programmable manner by adjusting the phase shifts of passive reflecting elements, is proposed to create smart radio environments, improve spectrum efficiency and enhance coverage capability. Firstly, some prospective application scenarios driven by the IRS empowered THz communications are introduced, including wireless mobile communications, secure communications, unmanned aerial vehicle (UAV) scenario, mobile edge computing (MEC) scenario and THz localization scenario. Then, we discuss the enabling technologies employed by the IRS empowered THz system, involving hardware design, channel estimation, capacity optimization, beam control, resource allocation and robustness design. Moreover, the arising challenges and open problems encountered in the future IRS empowered THz communications are also highlighted. Concretely, these emerging problems possibly originate from channel modeling, new material exploration, experimental IRS testbeds and intensive deployment. Ultimately, the combination of THz communications and IRS is capable of accelerating the development of 6G wireless networks.
  • SECURITY SCHEMES AND SOLUTIONS
    LI Wei, ZENG Xiaoyang, NAN Longmei, CHEN Tao, DAI Zibin
    China Communications. 2016, 13(1): 91-99.
    An Efficient and flexible implementation of block ciphers is critical to achieve information security processing. Existing implementation methods such as GPP, FPGA and cryptographic application-specific ASIC provide the broad range of support. However, these methods could not achieve a good tradeoff between high-speed processing and flexibility. In this paper, we present a reconfigurable VLIW processor architecture targeted at block cipher processing, analyze basic operations and storage characteristics, and propose the multi-cluster register-file structure for block ciphers. As for the same operation element of block ciphers, we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme. The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations, but also realizes dynamic configuration for cryptographic processing units. It has been implemented with 0.18µmCMOS technology, the test results show that the frequency can reach 350MHz, and power consumption is 420mw. Ten kinds of block and hash ciphers were realized in the processor. The encryption throughput of AES, DES, IDEA, and SHA-1 algorithm is 1554Mbps, 448Mbps, 785Mbps, and 424Mbps respectively, the test result shows that our processor’s encryption performance is significantly higher than other designs.
  • FEATURE TOPIC:COLLABORATIVE INTELLIGENCE FOR VEHICULAR INTERNET OF THINGS
    Xuting Duan, Hang Jiang, Daxin Tian, Tianyuan Zou, Jianshan Zhou, Yue Cao
    China Communications. 2021, 18(7): 1-12.
    In recent years, autonomous driving technology has made good progress, but the non-cooperative intelligence of vehicle for autonomous driving still has many technical bottlenecks when facing urban road autonomous driving challenges. V2I (Vehicle-to-Infrastructure) communication is a potential solution to enable cooperative intelligence of vehicles and roads. In this paper, the RGB-PVRCNN, an environment perception framework, is proposed to improve the environmental awareness of autonomous vehicles at intersections by leveraging V2I communication technology. This framework integrates vision feature based on PVRCNN. The normal distributions transform(NDT) point cloud registration algorithm is deployed both on onboard and roadside to obtain the position of the autonomous vehicles and to build the local map objects detected by roadside multi-sensor system are sent back to autonomous vehicles to enhance the perception ability of autonomous vehicles for benefiting path planning and traffic efficiency at the intersection. The field-testing results show that our method can effectively extend the environmental perception ability and range of autonomous vehicles at the intersection and outperform the PointPillar algorithm and the VoxelRCNN algorithm in detection accuracy.
  • Guest Editorial
    Gao Li, Wei Wang, Guoru Ding, Qihui Wu, Zitong Liu
    China Communications. 2021, 18(12): 51-64.
    The continuous change of communication frequency brings difficulties to the reconnaissance and prediction of non-cooperative communication networks. Since the frequency-hopping (FH) sequence is usually generated by a certain model with certain regularity, the FH frequency is thus predictable. In this paper, we investigate the FH frequency reconnaissance and prediction of a non-cooperative communication network by effective FH signal detection, time-frequency (TF) analysis, wavelet detection and frequency estimation. With the intercepted massive FH signal data, long short-term memory (LSTM) neural network model is constructed for FH frequency prediction. Simulation results show that our parameter estimation methods could estimate frequency accurately in the presence of certain noise. Moreover, the LSTM-based scheme can effectively predict FH frequency and frequency interval.
  • Guest Editorial
    Min Sheng, Di Zhou, Weigang Bai, Junyu Liu, Jiandong Li
    China Communications. 2022, 19(1): 64-76.
    The rapid development and continuous updating of the mega satellite constellation (MSC) have brought new visions for the future 6G coverage extension, where the global seamless signal coverage can realize ubiquitous services for user terminals. However, global traffic demands present non-uniform characteristics. Therefore, how to ensure the on-demand service coverage for the specific traffic demand, i.e., the ratio of traffic density to service requirement per unit area, is the core issue of 6G wireless coverage extension exploiting the MSC. To this regard, this paper first discusses the open challenges to reveal the future direction of 6G wireless coverage extension from the perspective of key factors affecting service coverage performance, i.e., the network access capacity, space segment capacity and their matching-relationship. Furthermore, we elaborate on the key factors affecting effective matchings of the aforementioned aspects, thereby improving service coverage capability.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Shanyun Liu, Xianbin Yu, Rongbin Guo, Yajie Tang, Zhifeng Zhao
    China Communications. 2021, 18(5): 33-49.
    For the sake of meeting the demand of data rates at terabit (Tbit) per second scale in future networks, the terahertz (THz) band is widely accepted as one of the potential key enabling technologies for next generation wireless communication systemsWith the progressive development of THz devices, regrading THz communications at system level is increasing crucial and captured the interest of plenty of researchersWithin this scope, THz channel modeling serves as an indispensable and fundamental elementBy surveying the latest literature findings, this paper reviews the problem of channel modeling in the THz band, with an emphasis on molecular absorption loss, misalignment fading and multipath fading, which are major influence factors in the THz channel modelingThen, we focus on simulators and experiments in the THz band, after which we give a brief introduction on applications of THz channel models with respects to capacity, security, and sensing as examplesFinally, we discuss some key issues in the future THz channel modeling.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Hang Yang, Shilie Zheng, Wei He, Xianbin Yu, Xianmin Zhang
    China Communications. 2021, 18(5): 131-152.
    To accommodate the ever-increasing wireless capacity, the terahertz (THz) orbital angular momentum (OAM) beam that combines THz radiation and OAM technologies has attracted much attention recently, with contributing efforts to explore new dimensions in the THz region. In this paper, we provide an overview of the generation and detection techniques of THz-OAM beams, as well as their applications in communications. The principle and research status of typical generation and detection methods are surveyed, and the advantages and disadvantages of each method are summarized from a viewpoint of wireless communication. It is shown that developing novel THz components in generating, detecting and (de)multiplexing THz-OAM beams has become the key engine to drive this direction forward. Anyway, beneficial from the combination of infinite orthogonal modes and large bandwidth, THz-OAM beams will have great potential in delivering very large capacity in next generation wireless communications.
  • Guest Editorial
    Qihui Wu, Min Zhang, Chao Dong, Yong Feng, Yanli Yuan, Simeng Feng, Tony Q. S. Quek
    China Communications. 2022, 19(1): 186-201.
    In recent years, with the growth in Unmanned Aerial Vehicles (UAVs), UAV-based systems have become popular in both military and civil applications.In these scenarios, the lack of reliable communication infrastructure has motivated UAVs to establish a network as flying nodes, also known as Flying Ad Hoc Networks (FANETs).However, in FANETs, the high mobility degree of flying and terrestrial users may be responsible for constant changes in the network topology, making end-to-end connections in FANETs challenging.Mobility estimation and prediction of UAVs can address the challenge mentioned above since it can provide better routing planning and improve overall FANET performance in terms of continuous service availability.We thus develop a Software Defined Network (SDN)-based heterogeneous architecture for reliable communication in FANETs.In this architecture, we apply an Extended Kalman Filter (EKF) for accurate mobility estimation and prediction of UAVs.In particular, we formulate the routing problem in SDN-based Heterogeneous FANETs as a graph decision problem.As the problem is NP-hard, we further propose a Directional Particle Swarming Optimization (DPSO) approach to solve it.The extensive simulation results demonstrate that the proposed DPSO routing can exhibit superior performance in improving the goodput, packet delivery ratio, and delay.
  • NETWORKS & SECURITY
    Mengke Yang, Movahedipour Mahmood, Xiaoguang Zhou, Salam Shafaq, Latif Zahid
    China Communications. 2017, 14(10): 180-191.
    Intellectualization has become a new trend for telecom industry, driven by intelligent technology including cloud computing, big data, and Internet of things. In order to satisfy the service demand of intelligent logistics, this paper designed an intelligent logistics platform containing the main applications such as e-commerce, self-service transceiver, big data analysis, path location and distribution optimization. The intelligent logistics service platform has been built based on cloud computing to collect, store and handling multi-source heterogeneous mass data from sensors, RFID electronic tag, vehicle terminals and APP, so that the open-access cloud services including distribution, positioning, navigation, scheduling and other data services can be provided for the logistics distribution applications. And then the architecture of intelligent logistics cloud platform containing software layer (SaaS), platform layer (PaaS) and infrastructure (IaaS) has been constructed accordance with the core technology relative high concurrent processing technique, heterogeneous terminal data access, encapsulation and data mining. Therefore, intelligent logistics cloud platform can be carried out by the service mode for implementation to accelerate the construction of the symbiotic win-win logistics ecological system and the benign development of the ICT industry in the trend of intellectualization in China.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Zheng Hu, Ping Zhang, Chunhong Zhang, Benhui Zhuang, Jianhua Zhang, Shangjing Lin, Tao Sun
    China Communications. 2022, 19(3): 16-35.
    Sixth Generation (6G) wireless communication network has been expected to provide global coverage, enhanced spectral efficiency, and AI(Artificial Intelligence)-native intelligence, etc. To meet these requirements, the computational concept of Decision-Making of cognition intelligence, its implementation framework adapting to foreseen innovations on networks and services, and its empirical evaluations are key techniques to guarantee the generation-agnostic intelligence evolution of wireless communication networks. In this paper, we propose an Intelligent Decision Making (IDM) framework, acting as the role of network brain, based on Reinforcement Learning modelling philosophy to empower autonomous intelligence evolution capability to 6G network. Besides, usage scenarios and simulation demonstrate the generality and efficiency of IDM. We hope that some of the ideas of IDM will assist the research of 6G network in a new or different light.
  • DIGITAL COMMUNICATIONS
    Yu Chi, Lan Chen*, Chao Lv
    China Communications. 2016, 13(6): 138-146.
    Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In this paper, we proposed an efficient symbol timing recovery algorithm of MPSK signals named OMQ (Ordered Maximum power using Quadratic approximation partially) algorithm which is based on the Quadratic Approximation (QA) algorithm. We used ordered statistic sorting method to reduce the computational complexity further, meanwhile maximum mean power principle was used to decrease frequency offset sensitivity. The proposed algorithm adopts estimation-down sampling structure which is suitable for small packet size transmission. The results show that, while comparing with the QA algorithm, the computational complexity is reduced by 75% at most when 8 samples per symbol are used. The proposed algorithm shows better performance in terms of the jitter variance and sensitivity to frequency offsets.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Yuanjie Li, Jincheng Dai, Zhongwei Si, Kai Niu, Chao Dong, Jiaru Lin, Sen Wang, Yifei Yuan
    China Communications. 2022, 19(3): 70-87.
    Unsourced multiple access (UMA) is a multi-access technology for massive, low-power, uncoordinated, and unsourced Machine Type Communication (MTC) networks. It ensures transmission reliability under the premise of high energy efficiency. Based on the analysis of the 6G MTC key performance indicators (KPIs) and scenario characteristics, this paper summarizes its requirements for radio access networks. Following this, the existing multiple access models are analyzed under these standards to determine UMA's advantages for 6G MTC according to its design characteristics. The critical technology of UMA is the design of its multiple-access coding scheme. Therefore, the existing UMA coding schemes from different coding paradigms are further summarized and compared. In particular, this paper comprehensively considers the energy efficiency and computational complexity of these schemes, studies the changes of the above two indexes with the increase of access scale, and considers the trade-off between the two. It is revealed by the above analysis that some guiding rules of UMA coding design. Finally, the open problems and potentials in this field are given for future research.
  • FEATURE TOPIC:COLLABORATIVE INTELLIGENCE FOR VEHICULAR INTERNET OF THINGS
    Liang Zhao, Muhammad Bin Saif, Ammar Hawbani, Geyong Min, Su Peng, Na Lin
    China Communications. 2021, 18(7): 103-116.
    Flying Ad hoc Network (FANET) has drawn significant consideration due to its rapid advancements and extensive use in civil applications. However, the characteristics of FANET including high mobility, limited resources, and distributed nature, have posed a new challenge to develop a secure and efficient routing scheme for FANET. To overcome these challenges, this paper proposes a novel cluster based secure routing scheme, which aims to solve the routing and data security problem of FANET. In this scheme, the optimal cluster head selection is based on residual energy, online time, reputation, blockchain transactions, mobility, and connectivity by using Improved Artificial Bee Colony Optimization (IABC). The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities. Further, a lightweight blockchain consensus algorithm, AI-Proof of Witness Consensus Algorithm (AI-PoWCA) is proposed, which utilizes the optimal cluster head for mining. In AI-PoWCA, the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51% attack. Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90% packet delivery ratio, lowest end-to-end delay, highest throughput, resilience against security attacks, and superior in block processing time.
  • Guest Editorial
    Ziying Wu, Danfeng Yan
    China Communications. 2021, 18(11): 26-41.
    Multi-access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional Internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based vehicle-aware Multi-access Edge Computing network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.
  • FEATURE TOPIC: TERAHERTZ WIRELESS COMMUNICATIONS
    Yinian Feng, Bo Zhang, Chen Zhi, Ke Liu, Weilong Liu, Fang Shen, Chuanqi Qiao, Jicong Zhang, Yong Fan, Xiaobo Yang
    China Communications. 2021, 18(5): 210-220.
    With the successful demonstration of terahertz (THz) high-speed wireless data transmission, the THz frequencies are now becoming a worth candidate for post-5G wireless communications. On the other hand, to bring THz communications a step closer to real scenario application, solving high data rate real-time transmission is also an important issue. This paper describes a 220-GHz solid-state dual-carrier wireless link whose maximum transmission real-time data rates are 20.8 Gbps (10.4 Gbps per channel). By aggregating two carrier signals in the THz band, the contradiction between high real-time data rate communication and low sampling rate analog-to-digital (ADC) and digital-to-analog converter (DAC) is alleviated. The transmitting and receiving front-ends consist of 220-GHz diplexers, 220-GHz sub-harmonic mixers based on anti-parallel Schottky barrier diodes, G-band low-noise amplifiers (LNA), WR-4.3 band high-gain Cassegrain antennas, high data rates dual-DAC and -ADC baseband platform and other components. The low-density parity-check (LDPC) encoding is also realized to improve the bit error rate (BER) of the received signal. Modulated signals are centered at 214.4 GHz and 220.6 GHz with -11.9 dBm and -13.4 dBm output power for channel 1 and 2, respectively. This link is demonstrated to achieve 20.8-Gbps real-time data transmission using 16-QAM modulation over a distance of 1030 m. The measured signal to noise ratio (SNR) is 17.3 dB and 16.5 dB, the corresponding BER is 8.6e-7 and 3.8e-7, respectively. Furthermore, 4K video transmission is also carried out which is clear and free of stutter. The successful transmission of aggregated channels in this wireless link shows the great potential of THz communication for future wireless high-rate real-time data transmission applications.
  • COMMUNICATION NETWORKS
    Zeheng Yang, Yongan Guo
    China Communications. 2016, 13(8): 177-183.
    Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature. VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth. Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources. The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%.
  • FEATURE TOPIC: INTELLIGENT INTERNET OF THINGS WITH RELIABLE COMMUNICATION AND COLLABORATION TECHNOLOGIES
    Zhang Cui, Xu Xiao, Wu Qiong, Fan Pingyi, Fan Qiang, Zhu Huiling, Wang Jiangzhou
    China Communications. 2024, 21(8): 1-17. DOI: https://doi.org/10.23919/JCC.fa.2023-0718.202408

    In vehicle edge computing (VEC), asynchronous federated learning (AFL) is used, where the edge receives a local model and updates the global model, effectively reducing the global aggregation latency. Due to different amounts of local data, computing capabilities and locations of the vehicles, renewing the global model with same weight is inappropriate. The above factors will affect the local calculation time and upload time of the local model, and the vehicle may also be affected by Byzantine attacks, leading to the deterioration of the vehicle data. However, based on deep reinforcement learning (DRL), we can consider these factors comprehensively to eliminate vehicles with poor performance as much as possible and exclude vehicles that have suffered Byzantine attacks before AFL. At the same time, when aggregating AFL, we can focus on those vehicles with better performance to improve the accuracy and safety of the system. In this paper, we proposed a vehicle selection scheme based on DRL in VEC. In this scheme, vehicle's mobility, channel conditions with temporal variations, computational resources with temporal variations, different data amount, transmission channel status of vehicles as well as Byzantine attacks were taken into account. Simulation results show that the proposed scheme effectively improves the safety and accuracy of the global model.

  • COMMUNICATIONS THEORIES & SYSTEMS
    Jingxuan Huang, Zesong Fei, Tianxiong Wang, Xinyi Wang, Fan Liu, Haijun Zhou, J. Andrew Zhang, Guohua Wei
    China Communications. 2019, 16(10): 100-111.
    With the development of automated driving vehicles, more and more vehicles will be fitted with more than one automotive radars, and the radar mutual interference will become very significant. Vehicle to everything (V2X) communication is a potential way for coordinating automotive radars and reduce the mutual interference. In this paper, we analyze the positional relation of the two radars that interfere with each other, and evaluate the mutual interference for different types of automotive radars based on Poisson point process (PPP). We also propose a centralized framework and the corresponding algorithm, which relies on V2X communication systems to allocate the spectrum resources for automotive radars to minimize the interference. The minimum spectrum resources required for zero-interference are analyzed for different cases. Simulation results validate the analysis and show that the proposed framework can achieve near-zero-interference with the minimum spectrum resources.
  • COVER PAPER
    Kai Chen, Qinglei Kong, Yijue Dai, Yue Xu, Feng Yin, Lexi Xu, Shuguang Cui
    China Communications. 2022, 19(1): 218-237.
    Data-driven paradigms are well-known and salient demands of future wireless communication.Empowered by big data and machine learning techniques, next-generation data-driven communication systems will be intelligent with unique characteristics of expressiveness, scalability, interpretability, and uncertainty awareness, which can confidently involve diversified latent demands and personalized services in the foreseeable future. In this paper, we review a promising family of nonparametric Bayesian machine learning models, i.e., Gaussian processes (GPs), and their applications in wireless communication.Since GP models demonstrate outstanding expressive and interpretable learning ability with uncertainty, they are particularly suitable for wireless communication. Moreover, they provide a natural framework for collaborating data and empirical models (DEM).Specifically, we first envision three-level motivations of data-driven wireless communication using GP models. Then, we present the background of the GPs in terms of covariance structure and model inference. The expressiveness of the GP model using various interpretable kernels, including stationary, non-stationary, deep and multi-task kernels, is showcased. Furthermore, we review the distributed GP models with promising scalability, which is suitable for applications in wireless networks with a large number of distributed edge devices. Finally, we list representative solutions and promising techniques that adopt GP models in various wireless communication applications.
  • BRAIN-COMPUTER-INTERFACE INSPIRED COMMUNICATIONS
    Xuelin Gu, Banghua Yang, Shouwei Gao, Honghao Gao, Linfeng Yan, Ding Xu, Wen Wang
    China Communications. 2022, 19(2): 62-72.
    After abusing drugs for long, drug users will experience deteriorated self-control cognitive ability, and poor emotional regulation. This paper designs a closed-loop virtual-reality (VR), motorimagery (MI) rehabilitation training system based on brain-computer interface (BCI) (MI-BCI+VR), aiming to enhance the self-control, cognition, and emotional regulation of drug addicts via personalized rehabilitation schemes. This paper is composed of two parts. In the first part, data of 45 drug addicts (mild: 15; moderate: 15; and severe: 15) is tested with electroencephalogram (EEG) and near-infrared spectroscopy (NIRS) equipment (EEG-NIRS) under the dual-mode, synchronous signal collection paradigm. Using these data sets, a dual-modal signal convolutional neural network (CNN) algorithm is then designed based on decision fusion to detect and classify the addiction degree. In the second part, the MIBCI+ VR rehabilitation system is designed, optimizing the Filter Bank Common Spatial Pattern (FBCSP) algorithm used in MI, and realizing MI-EEG intention recognition. Eight VR rehabilitation scenes are devised, achieving the communication between MI-BCI and VR scene models. Ten subjects are selected to test the rehabilitation system offline and online, and the test accuracy verifies the feasibility of the system. In future, it is suggested to develop personalized rehabilitation programs and treatment cycles based on the addiction degree.
  • 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE
    Borui Zhao, Qimei Cui, Shengyuan Liang, Jinli Zhai, Yanzhao Hou, Xueqing Huang, Miao Pan, Xiaofeng Tao
    China Communications. 2022, 19(3): 50-69.
    As Information, Communications, and Data Technology (ICDT) are deeply integrated, the research of 6G gradually rises. Meanwhile, federated learning (FL) as a distributed artificial intelligence (AI) framework is generally believed to be the most promising solution to achieve “Native AI” in 6G. While the adoption of energy as a metric in AI and wireless networks is emerging, most studies still focused on obtaining high levels of accuracy, with little consideration on new features of future networks and their possible impact on energy consumption. To address this issue, this article focuses on green concerns in FL over 6G. We first analyze and summarize major energy consumption challenges caused by technical characteristics of FL and the dynamical heterogeneity of 6G networks, and model the energy consumption in FL over 6G from aspects of computation and communication. We classify and summarize the basic ways to reduce energy, and present several feasible green designs for FL-based 6G network architecture from three perspectives. According to the simulation results, we provide a useful guideline to researchers that different schemes should be used to achieve the minimum energy consumption at a reasonable cost of learning accuracy for different network scenarios and service requirements in FL-based 6G network.
  • FEATURE TOPIC:COLLABORATIVE INTELLIGENCE FOR VEHICULAR INTERNET OF THINGS
    Shiyi Wang, Yong Liao
    China Communications. 2021, 18(7): 36-43.
    With the rapid development of the Internet of vehicles (IoV), vehicle to everything (V2X) has strict requirements for ultra-reliable and low latency communications (URLLC), and massive multi-input multi-output (MIMO) channel state information (CSI) feedback can effectively support URLLC communication in 5G vehicle to infrastructure (V2I) scenarios. Existing research applies deep learning (DL) to CSI feedback, but most of its algorithms are based on low-speed outdoor or indoor environments and assume that the feedback link is perfect. However, the actual channel still has the influence of additive noise and nonlinear effects, especially in the high-speed V2I scene, the channel characteristics are more complex and time-varying. In response to the above problems, this paper proposes a CSI intelligent feedback network model for V2I scenarios, named residual mix-net (RM-Net). The network learns the channel characteristics in the V2I scenario at the vehicle user (User Equipment, UE), compresses the CSI and sends it to the channel; the roadside base station (Base Station, BS) receives the data and learns the compressed data characteristics, and then restore the original CSI. The system simulation results show that the RM-Net training speed is fast, requires fewer training samples, and its performance is significantly better than the existing DL-based CSI feedback algorithm. It can learn channel characteristics in high-speed mobile V2I scenarios and overcome the influence of additive noise. At the same time, the network still has good performance under high compression ratio and low signal-to-noise ratio (SNR).
  • SECURITY SCHEMES AND SOLUTIONS
    TIAN Donghai, JIA Xiaoqi, CHEN Junhua, HU Changzhen
    China Communications. 2016, 13(1): 113-123.
    Recently, virtualization technologies have been widely used in industry. In order to monitor the security of target systems in virtualization environments, conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems. However, these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems. To address these problems, in this paper, we present a concurrent security monitoring method which decouples traditional serial mechanisms, including security event collector and analyzer, into two concurrent components. On one hand, we utilize the SIM framework to deploy the event collector into the target virtual machine. On the other hand, we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment. To address the synchronization problem between these two concurrent components, we make use of Lamport’s ring buffer algorithm. Based on the Xen hypervisor, we have implemented a prototype system named COMO. The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.
  • COMMUNICATION NETWORKS
    Jianyuan Feng, Zhiyong Feng, Zhiqing Wei
    China Communications. 2016, 13(8): 148-158.
    Although small cell offloading technology can alleviate the congestion in macrocell, aggressively offloading data traffic from macrocell to small cell can also degrade the performance of small cell due to the heavy load. Because of collision and backoff, the degradation is significant especially in network with contention-based channel access, and finally decreases throughput of the whole network. To find an optimal fraction of traffic to be offloaded in heterogeneous network, we combine Markov chain with the Poisson point process model to analyze contention-based throughput in irregularly deployment networks. Then we derive the close-form solution of the throughput and find that it is a function of the transmit power and density of base stations. Based on this, we propose the load-aware offloading strategies via power control and base station density adjustment. The numerical results verify our analysis and show a great performance gain compared with non-load-aware offloading.
  • SECURITY SCHEMES AND SOLUTIONS
    ZHAO Guosheng, WANG Jian
    China Communications. 2016, 13(1): 150-160.
    There are a lot of security issues in block cipher algorithm. Security analysis and enhanced design of a dynamic block cipher was proposed. Firstly, the safety of ciphertext was enhanced based on confusion substitution of S-box, thus disordering the internal structure of data blocks by four steps of matrix transformation. Then, the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function. The dynamic key was finally generated by using LFSR, which improved the stochastic characters of secret key in each of round of iteration. The safety performance of proposed algorithm was analyzed by simulation test. The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security. Meanwhile, the proposed algorithm has highly scalability, the dimension of S-box and the number of register can be dynamically extended according to the security requirement.
  • Guest Editorial
    Kang Liu, Wei Quan, Deyun Gao, Chengxiao Yu, Mingyuan Liu, Yuming Zhang
    China Communications. 2021, 18(8): 62-74.
    Adaptive packet scheduling can efficiently enhance the performance of multipath Data Transmission. However, realizing precise packet scheduling is challenging due to the nature of high dynamics and unpredictability of network link states. To this end, this paper proposes a distributed asynchronous deep reinforcement learning framework to intensify the dynamics and prediction of adaptive packet scheduling. Our framework contains two parts: local asynchronous packet scheduling and distributed cooperative control center. In local asynchronous packet scheduling, an asynchronous prioritized replay double deep Q-learning packets scheduling algorithm is proposed for dynamic adaptive packet scheduling learning, which makes a combination of prioritized replay double deep Q-learning network (P-DDQN) to make the fitting analysis. In distributed cooperative control center, a distributed scheduling learning and neural fitting acceleration algorithm to adaptively update neural network parameters of P-DDQN for more precise packet scheduling. Experimental results show that our solution has a better performance than Random weight algorithm and Round--Robin algorithm in throughput and loss ratio. Further, our solution has 1.32 times and 1.54 times better than Random weight algorithm and Round--Robin algorithm on the stability of multipath data transmission, respectively.
  • Guest Editorial
    Shilian Zheng, Linhui Ye, Xuanye Wang, Jinyin Chen, Huaji Zhou, Caiyi Lou, Zhijin Zhao, Xiaoniu Yang
    China Communications. 2021, 18(12): 94-107.
    The spectrum sensing model based on deep learning has achieved satisfying detection performence, but its robustness has not been verified. In this paper, we propose primary user adversarial attack (PUAA) to verify the robustness of the deep learning based spectrum sensing model. PUAA adds a carefully manufactured perturbation to the benign primary user signal, which greatly reduces the probability of detection of the spectrum sensing model. We design three PUAA methods in black box scenario. In order to defend against PUAA, we propose a defense method based on autoencoder named DeepFilter. We apply the long short-term memory network and the convolutional neural network together to DeepFilter, so that it can extract the temporal and local features of the input signal at the same time to achieve effective defense. Extensive experiments are conducted to evaluate the attack effect of the designed PUAA method and the defense effect of DeepFilter. Results show that the three PUAA methods designed can greatly reduce the probability of detection of the deep learning-based spectrum sensing model. In addition, the experimental results of the defense effect of DeepFilter show that DeepFilter can effectively defend against PUAA without affecting the detection performance of the model.