Archive

  • Select all
    |
    Guest Editorial
  • Guest Editorial
    Mahalingam Ramkumar
    2019, 16(6): 1-17.
    Abstract ( )   Knowledge map   Save
    A blockchain based system integrity (BCSI) framework for assuring the integrity of information system processes is presented. BCSI is well suited for a broad class of large scale real-world information systems. Under the BCSI framework, the integrity of any information system I is assured by executing the finite state machine model for system I processes in a blockchain network. The BCSI framework is compared and contrasted with the Clark-Wilson (CW) system integrity model, and existing blockchain based frameworks like Ethereum.
  • Guest Editorial
    Shaoyong Guo, Xing Hu, Ziqiang Zhou, Xinyan Wang, Feng Qi, Lifang Gao
    2019, 16(6): 18-30.
    Abstract ( )   Knowledge map   Save
    Data sharing and privacy securing present extensive opportunities and challenges in vehicular network. This paper introduces `trust access authentication scheme’ as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles. Blockchain, which can provide secure authentication and protected privacy, is a crucial technology. However, traditional cloud computing performs poorly in supplying low-latency and fast-response services for moving vehicles. In this situation, edge computing enabled Blockchain network appeals to be a promising method, where moving vehicles can access storage or computing resource and get authenticated from Blockchain edge nodes directly. In this paper, a hierarchical architecture is proposed consist of vehicular network layer, Blockchain edge layer and Blockchain network layer. Through a authentication mechanism adopting digital signature algorithm, it achieves trusted authentication and ensures valid verification. Moreover, a caching scheme based on many-to-many matching is proposed to minimize average delivery delay of vehicles. Simulation results prove that the proposed caching scheme has a better performance than existing schemes based on centralized model or edge caching strategy in terms of hit ratio and average delay.
  • Guest Editorial
    Xin Wei, Yong Yan, Wei Jiang, Jing Shen, Xuesong Qiu
    2019, 16(6): 31-41.
    Abstract ( )   Knowledge map   Save
    Mobile crowdsensing(MCS) is an emerging pattern which means task initiators attract mobile users sensing with their own devices by some platforms. MCS could exploit idle resources in low cost, while it has lots of flaws, which impede its developments. First, isolations between different MCS systems leads to wastage of social resources. What’s more, current MCS always operate in a centralized way, which causes it vulnerable and unbelievable. Blockchain is a promising technology which could supply a credible and transparent environment. This paper construct a blockchain based MCS market and design smart contract for its operation. In our design, platform breaks isolation by blockchain, task initiators and mobile users manage their tasks by smart contract and bargain price with distributed algorithm. By this way, resource could be exploited better, and the market could be more fair. What’s more, the paper analyzes Walrasian Equilibrium (WE) in the market, and details how to deploy MCS in blockchain. Evalution results shows that Equilibrium could be found.
  • Guest Editorial
    Hui Yang, Yongshen Liang, Qiuyan Yao, Shaoyong Guo, Ao Yu, Jie Zhang
    2019, 16(6): 42-54.
    Abstract ( )   Knowledge map   Save
    Software defined optical networking (SDON) is a critical technology for the next generation network with the advantages of programmable control and etc. As one of the key issues of SDON, the security of control plane has also received extensive attention, especially in certain network scenarios with high security requirement. Due to the existence of vulnerabilities and heavy overhead, the existing firewalls and distributed control technologies cannot solve the control plane security problem well. In this paper, we propose a distributed control architecture for SDON using the blockchain technique (BlockCtrl). The proposed BlockCtrl model introduces the advantages of blockchain into SDON to achieve a high-efficiency fault tolerant control. We have evaluated the performance of our proposed architecture and compared it to the existing models with respect to various metrics including processing rate, recovery latency and etc. The numerical results show that the BlockCtrl is capable of attacks detection and fault tolerant control in SDON with high performance on resource utilization and service correlation.
  • Guest Editorial
    Tianbo Lu, Ru Yan, Min Lei, Zhimin Lin
    2019, 16(6): 55-68.
    Abstract ( )   Knowledge map   Save
    Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users, which is the underlying technology of digital currency like bitcoin. The anonymity of blockchain has caused widespread concern. In this paper, we put forward AABN, an Anonymity Assessment model based on Bayesian Network. Firstly, we investigate and analyze the anonymity assessment techniques, and focus on typical anonymity assessment schemes. Then the related concepts involved in the assessment model are introduced and the model construction process is described in detail. Finally, the anonymity in the MIX anonymous network is quantitatively evaluated using the methods of accurate reasoning and approximate reasoning respectively, and the anonymity assessment experiments under different output strategies of the MIX anonymous network are analyzed.
  • Guest Editorial
    Donghui Ding, Kang Li, Linpeng Jia, Zhongcheng Li, Jun Li, Yi Sun
    2019, 16(6): 69-79.
    Abstract ( )   Knowledge map   Save
    The blockchain technology has been applied to wide areas. However, the open and transparent properties of the blockchains pose serious challenges to users’ privacy. Among all the schemes for the privacy protection, the zero-knowledge proof algorithm conceals most of the private information in a transaction, while participants of the blockchain can validate this transaction without the private information. However, current schemes are only aimed at blockchains with the UTXO model, and only one type of assets circulates on these blockchains. Based on the zero-knowledge proof algorithm, this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model. We design the transaction structure, anonymous addresses and anonymous asset metadata, and also propose the methods of the asset transfer and double-spending detection. The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof. And finally, we conduct the experiments to evaluate our scheme.
  • MILLIMETER WAVE COMMUNICATIONS
  • MILLIMETER WAVE COMMUNICATIONS
    Xiongwen Zhao, Fei Du, Suiyan Geng, Ningyao Sun, Yu Zhang, Zihao Fu, Guangjian Wang
    2019, 16(6): 80-90.
    Abstract ( )   Knowledge map   Save
    In this work, a frame work for time-varying channel modeling and simulation is proposed by using neural network (NN) to overcome the shortcomings in geometry based stochastic model (GBSM) and simulation approach. Two NN models are developed for modeling of path loss together with shadow fading (SF) and joint small scale channel parameters. The NN models can predict path loss plus SF and small scale channel parameters accurately compared with measurement at 26 GHz performed in an outdoor microcell. The time-varying path loss and small scale channel parameters generated by the NN models are proposed to replace the empirical path loss and channel parameter random numbers in GBSM-based framework to playback the measured channel and match with its environment. Moreover, the sparse feature of clusters, delay and angular spread, channel capacity are investigated by a virtual array measurement at 28 GHz in a large waiting hall.
  • MILLIMETER WAVE COMMUNICATIONS
    Wence Zhang, Xiaoxuan Xia, Yinkai Fu, Xu Bao
    2019, 16(6): 91-102.
    Abstract ( )   Knowledge map   Save
    In a millimeter-wave (mmWave) Massive multiple-input multiple-output (MIMO) systems, full-digital beamforming (i.e., connecting each antenna with a specific radio-frequency (RF) chain) becomes inefficient due to the hardware cost and power consumption. Therefore, hybrid analog and digital transceiver where the number of RF chains are much smaller than that of the antennas has drawn great research interest. In this work, we investigate the use of low-resolution analog-to-digital converters (ADCs) in the uplink of multi-user hybrid and full-digital mmWave Massive MIMO systems. To be specific, we compare the performance of full-digital minimum mean square error (MMSE) and hybrid MMSE beamforming in both sum rates and energy efficiency. Accurate approximations of sum rates and energy efficiency are provided for both schemes, which captures the dominant factors. The analytical results show that full-digital beamforming outperforms hybrid beamforming in terms of sum rates and requires only a small portion () of antennas used by hybrid beamforming to achieve the same sum rates. We given sufficient condition for full-digital beamforming to outperform hybrid beamforming in terms of energy efficiency. Moreover, an algorithm is proposed to search for the optimal ADC resolution bits. Numerical results demonstrate the correctness of the analysis.
  • MILLIMETER WAVE COMMUNICATIONS
    Jaipreet Kaur, Maninder Lal Singh
    2019, 16(6): 103-113.
    Abstract ( )   Knowledge map   Save
    A novel scheme ‘user assisted cooperative relaying in beamspace massive multiple input multiple output (M-MIMO) non-orthogonal multiple access (NOMA) system’ has been proposed to improve coverage area, spectrum and energy efficiency for millimeter wave (mmWave) communications. A downlink system for M users, where base station (BS) is equipped with beamforming lens antenna structure having NRF radio frequency (RF) chains, has been considered. A dynamic cluster of users is formed within a beam and the intermediate users (in that cluster) between beam source and destination (user) act as relaying stations. By the use of successive interference cancellation (SIC) technique of NOMA within a cluster, the relaying stations relay the symbols with improved power to the destination. For maximizing achievable sum rate, transmit precoding and dynamic power allocation for both intra and inter beam power optimization are implemented. Simulations for performance evaluation are carried out to validate that the proposed system outperforms the conventional beamspace M-MIMO NOMA system for mmWave communications in terms of spectrum and energy efficiency.
  • COMMUNICATIONS THEORIES & SYSTEMS
  • COMMUNICATIONS THEORIES & SYSTEMS
    Omar Daoud
    2019, 16(6): 114-128.
    Abstract ( )   Knowledge map   Save
    Competitiveness in the modern wireless systems’ provided services is a key factor in the development, in addition to the adaptation to/harmonization of user demand. Therefore, this paper discussed the quality of services from the point of view of the need for supporting the needed data rates. For this purpose, a benchmark based on Multi-Antenna Multiband Orthogonal Frequency Division Multiplexing has been proposed to compatible with Ultra-Wideband systems such as the fifth generation based technologies. In order to enhance the system quality of service, the structure of the ultra-wideband system’s main stage; namely Orthogonal Frequency Division Multiplexing has been modified by imposing a low complexity designed Haar-wavelets stage instead of the fast Fourier transform stage. This is in addition to reallocate the transmitted power in order to reduce the effect of one of the main drawbacks that is found in the Orthogonal Frequency Division Multiplexing; namely the peak-to-average power ratio problem. A MATLAB simulation has been performed in order to validate the propositions that have been made based on six different performance factors. As a result, the new propositions were achieved our targets by reducing the system’s complexity in terms of mathematical operations and by giving promising results in managing the transmitted powers. Furthermore, the effectiveness of such work has been verified and compared with four different work in the literature
  • COMMUNICATIONS THEORIES & SYSTEMS
    Prabhat Thakur, Alok Kumar, S Pandit, G Singh, S N Satashia
    2019, 16(6): 129-149.
    Abstract ( )   Knowledge map   Save
    Recently, the increasing demand of radio spectrum for the next generation communication systems due to the explosive growth of applications appetite for bandwidths has led to the problem of spectrum scarcity. The potential approaches among the proposed solutions to resolve this issue are well explored cognitive radio (CR) technology and recently introduced non-orthogonal multiple access (NOMA) techniques. Both the techniques are employed for efficient spectrum utilization and assure the significant improvement in the spectral efficiency. Further, the significant improvement in spectral efficiency can be achieved by combining both the techniques. Since the CR is well-explored technique as compared to that of the NOMA in the field of communication, therefore it is worth and wise to implement this technique over the CR. In this article, we have presented the frameworks of NOMA implementation over CR as well as the feasibility of proposed frameworks. Further, the differences between proposed CR-NOMA and conventional CR frameworks are discussed. Finally, the potential issues regarding the implementation of CR-NOMA are explored.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Linna Hu, Rui Shi, Minghe Mao, Zhiyu Chen, Hongxi Zhou, Weiliang Li
    2019, 16(6): 150-161.
    Abstract ( )   Knowledge map   Save
    In order to improve the energy efficiency (EE) in cognitive radio (CR), this paper investigates the joint design of cooperative spectrum sensing time and the power control optimization problem for the secondary user systems to achieve the maximum energy efficiency in a cognitive network based on hybrid spectrum sharing, meanwhile considering the maximum transmit power, user quality of service (QoS) requirements, interference limitations, and primary user protection. The optimization of energy efficient sensing time and power allocation is formulated as a non-convex optimization problem. The Dinkelbach’s method is adopted to solve this problem and to transform the non-convex optimization problem in fractional form into an equivalent optimization problem in the form of subtraction. Then, an iterative power allocation algorithm is proposed to solve the optimization problem. The simulation results show the effectiveness of the proposed algorithms for energy-efficient resource allocation in the cognitive network.
  • NETWORKS & SECURITY
  • NETWORKS & SECURITY
    Ping Lv, Qinrang Liu, Hongchang Chen, Ting Chen
    2019, 16(6): 162-172.
    Abstract ( )   Knowledge map   Save
    With the introduction of software defined hardware by DARPA Electronics Resurgence Initiative, software definition will be the basic attribute of information system. Benefiting from boundary certainty and algorithm aggregation of domain applications, domain-oriented computing architecture has become the technical direction that considers the high flexibility and efficiency of information system. Aiming at the characteristics of data-intensive computing in different scenarios such as Internet of Things (IoT), big data, artificial intelligence (AI), this paper presents a domain-oriented software defined computing architecture, discusses the hierarchical interconnection structure, hybrid granularity computing element and its computational kernel extraction method, finally proves the flexibility and high efficiency of this architecture by experimental comparison.
  • NETWORKS & SECURITY
    Yin Lu, Jun Fang, Zhong Guo, J. Andrew Zhang
    2019, 16(6): 173-184.
    Abstract ( )   Knowledge map   Save
    Random access is a well-known multiple access method for uncoordinated communication nodes. Existing work mainly focuses on optimizing iterative access protocols, assuming that packets are corrupted once they are collided, or that feedback is available and can be exploited. In practice, a packet may still be able to be recovered successfully even when collided with other packets. System design and performance analysis under such a situation, particularly when the details of collision are taken into consideration, are less known. In this paper, we provide a framework for analytically evaluating the actual detection performance in a random temporal multiple access system where nodes can only transmit. Explicit expressions are provided for collision probability and signal to interference and noise ratio (SINR) when different numbers of packets are collided. We then discuss and compare two receiver options for the AP, and provide detailed receiver design for the premium one. In particular, we propose a synchronization scheme which can largely reduce the preamble length. We also demonstrate that system performance could be a convex function of preamble length both analytically and via simulation, as well as the forward error correction (FEC) coding rate.
  • NETWORKS & SECURITY
    Longmei Nan, Xuan Yang, Xiaoyang Zeng, Wei Li, Yiran Du, Zibin Dai, Lin Chen
    2019, 16(6): 185-199.
    Abstract ( )   Knowledge map   Save
    As an important branch of information security algorithms, the efficient and flexible implementation of stream ciphers is vital. Existing implementation methods, such as FPGA, GPP and ASIC, provide a good support, but they could not achieve a better tradeoff between high speed processing and high flexibility. ASIC has fast processing speed, but its flexibility is poor, GPP has high flexibility, but the processing speed is slow, FPGA has high flexibility and processing speed, but the resource utilization is very low. This paper studies a stream cryptographic processor which can efficiently and flexibly implement a variety of stream cipher algorithms. By analyzing the structure model, processing characteristics and storage characteristics of stream ciphers, a reconfigurable stream cryptographic processor with special instructions based on VLIW is presented, which has separate/cluster storage structure and is oriented to stream cipher operations. The proposed instruction structure can effectively support stream cipher processing with multiple data bit widths, parallelism among stream cipher processing with different data bit widths, and parallelism among branch control and stream cipher processing with high instruction level parallelism; the designed separate/clustered special bit registers and general register heaps, key register heaps can satisfy cryptographic requirements. So the proposed processor not only flexibly accomplishes the combination of multiple basic stream cipher operations to finish stream cipher algorithms. It has been implemented with 0.18µm CMOS technology, the test results show that the frequency can reach 200MHz, and power consumption is 310mw. Ten kinds of stream ciphers were realized in the processor. The key stream generation throughput of Grain-80, W7, MICKEY, ACHTERBAHN and Shrink algorithm is 100Mbps, 66.67Mbps, 66.67Mbps, 50 Mbps and 800Mbps, respectively. The test result shows that the processor presented can achieve good tradeoff between high performance and flexibility of stream ciphers.
  • NETWORKS & SECURITY
    Guiqi Liu, Zhihong Qian, Xue Wang
    2019, 16(6): 200-214.
    Abstract ( )   Knowledge map   Save
    DV-Hop localization algorithm has greater localization error which estimates distance from an unknown node to the different anchor nodes by using estimated average size of a hop to achieve the location of the unknown node. So an improved DV-Hop localization algorithm based on correctional average size of a hop, HDCDV-Hop algorithm, is proposed. The improved algorithm corrects the estimated distance between the unknown node and different anchor nodes based on fractional hop count information and relatively accurate coordinates of the anchor nodes information, and it uses the improved Differential Evolution algorithm to get the estimate location of unknown nodes so as to further reduce the localization error. Simulation results show that our proposed algorithm have lower localization error and higher localization accuracy compared with the original DV-Hop algorithm and other classical improved algorithms.