Archive

  • Select all
    |
    COVER PAPER
  • COVER PAPER
    Xiang Zhang, Shangbin Qiao, Mugen Peng, Yong Li
    2019, 16(7): 1-12.
    Abstract ( )   Knowledge map   Save
    In 5G systems, massive multiple-input multiple-output (MIMO) has been adopted in base stations (BSs) to improve spectral efficiency and coverage. The traditional conductive performance test techniques are challenging due to the unaffordable cost and high complexity when testing a large number of antennas. To solve this problem, the over-the-air (OTA) test has been presented, in which probe selection is the key to reduce the number of channel emulators and probes. In this paper, a novel artificial bee colony (ABC) algorithm is introduced to enhance the efficiency and accuracy of probe selection procedure. A sectoring-based multi-probe anechoic chamber (MPAC) is built to evaluate the throughput performance of massive MIMO equipped in 5G BS. In addition, link level simulation is carried out to evaluate the proposal’s performance gain under the commercial network assumptions, where the average throughput of three velocity is given with different SNR region. The results suggest that OTA chamber and multi-probe wall are available not only for 5G BSs, but also for user equipments (UEs) with end-to-end communication.
  • REVIEW PAPER
  • REVIEW PAPER
    Yifan Liu, Bo Zhao, Pengyuan Zhao, Peiru Fan, Hui Liu
    2019, 16(7): 13-31.
    Abstract ( )   Knowledge map   Save
    Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmability, the “three-layer two-interface” architecture of SDN changes the traditional network and increases the network attack nodes, which results in new security issues. In this paper, we firstly introduced the background, architecture and working process of SDN. Secondly, we summarized and analyzed the typical security issues from north to south: application layer, northbound interface, control layer, southbound interface and data layer. Another contribution is to review and analyze the existing solutions and latest research progress of each layer, mainly including: authorized authentication module, application isolation, DoS/DDoS defense, multi-controller deployment and flow rule consistency detection. Finally, a conclusion about the future works of SDN security and an idealized global security architecture is proposed.
  • COMMUNICATIONS THEORIES & SYSTEMS
  • COMMUNICATIONS THEORIES & SYSTEMS
    Renchao Xie, Jun Wu, Rui Wang, Tao Huang
    2019, 16(7): 32-48.
    Abstract ( )   Knowledge map   Save
    Caching and virtualization have been considered as the promising techniques in 5G Networks. In 5G networks with virtualization, the caching resources deployed by infrastructure providers (InPs) can be abstracted into isolated slices and transparently shared by mobile virtual network operators (MVNOs). In this case, one of the most important issues is how the MVNOs to share the caching resource. To solve this issue, different from previous works, a hierarchical caching architecture that core network and radio access network (RAN) have the caching capability in 5G networks with virtualization is first considered in this paper. Then, we study the problem of hierarchical caching resource sharing for MVNOs, and a competitive game to maximize their expectation revenue based on the oligopoly market model is formulated. As it is a hard problem to find the optimal solution in the hierarchical caching resource sharing problem, we decompose the optimization problem into two independent caching resource sharing problems in RAN and core network, respectively. Then the local optimal solutions are solved and the global Nash equilibrium solution is achieved. Finally, simulation results are illustrated to demonstrate the performance of the proposed scheme.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Rui Xin, Zuyao Ni, Sheng Wu, Linling Kuang, Chunxiao Jiang
    2019, 16(7): 49-60.
    Abstract ( )   Knowledge map   Save
    In this paper, we propose a joint channel estimation and symbol detection (JCESD) algorithm relying on message-passing algorithms (MPA) for orthogonal frequency division multiple access (OFDMA) systems. The channel estimation and symbol detection leverage the framework of expectation propagation (EP) and belief propagation (BP) with the aid of Gaussian approximation, respectively. Furthermore, to reduce the computation complexity involved in channel estimation, the matrix inversion is transformed into a series of diagonal matrix inversions through the Sherman-Morrison formula. Simulation experiments show that the proposed algorithm can reduce the pilot overhead by about 50%, compared with the traditional linear minimum mean square error (LMMSE) algorithm, and can approach to the bit error rate (BER) performance bound of perfectly known channel state information within 0.1 dB.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Zhitong Xing, Kaiming Liu, Yuan’an Liu
    2019, 16(7): 61-69.
    Abstract ( )   Knowledge map   Save
    The μ-law companding function has been applied widely in orthogonal frequency division multiplexing (OFDM) to reduce the peak-to-average power ratio (PAPR). However, nonlinear distortion caused by the μ-law companding function is considered a key impairment in OFDM communication systems. Few studies have addressed theoretical nonlinear distortion caused by μ-law companding function for OFDM systems. In this paper, we derive a closed-form expression of signal distortion as well as the closed-form bit error rate (BER) of OFDM system caused by the μ-law companding function. Based on the theoretical signal distortion and BER expression, the theoretical BER value and signal distortion value can also be calculated, which can guide us to choose appropriate μ value for different BER condition and bit-to-noise (Eb/N0) condition efficiently. Then the PAPR performance can also be predicted. The results show good agreement on the Monte-Carlo simulation results and the obtained theoretical BER results. Furthermore, based on theoretical signal distortion and theoretical BER expression, the figure of the relationship among BER value, Eb/N0 and μ is also given. Based on this figure, we can find the appropriate μ law for different BER and Eb/N0 condition. And then the PAPR performance can also be predicted.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Weihong Wu, Jiang Liu, Tao Huang
    2019, 16(7): 70-82.
    Abstract ( )   Knowledge map   Save
    There are an increasing of scenarios that require the independent bandwidth and delay demands. For instance, in a data center, the interactive message would not occupy much bandwidth, but it requires the rigorous demands for the delay. However, the existing QoS approaches are mainly bandwidth based, which are inappropriate for these scenarios. Hence, we propose the decoupled scheme in the OpenFlow networks to provide the centralized differential bandwidth and delay control. We leverage the mature HTB to manage the bandwidth. And we design the Queue Delay Management Scheme (QDMS) for queuing delay arrangement, as well as the Comprehensive Parameters based Dijkstra Route algorithm (CPDR) for the propagation delay control. The evaluation results verify the decoupling effectiveness. And the decoupled scheme can reduce the delay for high priority flows.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Yupeng Li, Jianhua Zhang, Pan Tang, Lei Tian
    2019, 16(7): 83-95.
    Abstract ( )   Knowledge map   Save
    Cluster-based channel model is the main stream of fifth generation mobile communications, thus the accuracy of clustering algorithm is important. Traditional Gaussian mixture model (GMM) does not consider the power information which is important for the channel multipath clustering. In this paper, a normalized power weighted GMM (PGMM) is introduced to model the channel multipath components (MPCs). With MPC power as a weighted factor, the PGMM can fit the MPCs in accordance with the cluster-based channel models. Firstly, expectation maximization (EM) algorithm is employed to optimize the PGMM parameters. Then, to further increase the searching ability of EM and choose the optimal number of components without resort to cross-validation, the variational Bayesian (VB) inference is employed. Finally, 28 GHz indoor channel measurement data is used to demonstrate the effectiveness of the PGMM clustering algorithm.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Tao Yu, Yuchen Zhang, Diyue Chen, Hongyan Cui, Jilong Wang
    2019, 16(7): 96-108.
    Abstract ( )   Knowledge map   Save
    Routing loops can cause packet loss and long delay problems in the traditional network. Even in future networks - Software-Defined Networks, with loop-free implementation mechanism, it still suffers loop problems. In this paper, we propose an architecture to solve the loop problem in SDN. Unlike the existing passive routing loop detection algorithm, this algorithm processes based on the SDN loop-free characteristic, by auditing third-party network forwarding rules’ modification requests to avoids loop generation, thus avoid the network loop problems. Testbed is built to simulate our proposed algorithm. The evaluation shows that the loop audit algorithm proposed in this paper has better performance in extra spatial utilization and smaller number of extra interactions between SDN controller and switches.
  • NETWORKS & SECURITY
  • NETWORKS & SECURITY
    Wei Zhang, Yao Qin, Wenjing Zhao, Minzheng Jia, Qiang Liu, Ruisi He, Bo Ai
    2019, 16(7): 109-119.
    Abstract ( )   Knowledge map   Save
    Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT generally faces the challenges from energy constraint and implementation cost. In this paper, we will introduce a new green communication paradigm, the ambient backscatter (AmBC), that could utilize the environmental wireless signals for both powering a tiny-cost device and backscattering the information symbols. Specifically, we will present the basic principles of AmBC, analyze its features and advantages, suggest its open problems, and predict its potential applications for our future IoT.
  • NETWORKS & SECURITY
    Xiaoyan Hu, Xuhui Liu, Lixia Zhao, Jian Gong, Guang Cheng
    2019, 16(7): 120-130.
    Abstract ( )   Knowledge map   Save
    We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an upstream node due to its multipath forwarding. Furthermore, we propose NDRUDAF, a NACK based mechanism that enhances the Interest forwarding and enables Detection and fast Recovery from such Unanticipated Data Access Failure. In the NDN enhanced with NDRUDAF, the router that aggregates the Interest detects such unanticipated data access failure based on a negative acknowledgement from the upstream node that judges the Interest as a duplicate one. Then the router retransmits the Interest as soon as possible on behalf of the requester whose Interest is aggregated to fast recover from the data access failure. We qualitatively and quantitatively analyze the performance of the NDN enhanced with our proposed NDRUDAF and compare it with that of the present NDN. Our experimental results validate that NDRUDAF improves the system performance in case of such unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers.
  • NETWORKS & SECURITY
    Song Cui, Lijuan Duan, Bei Gong, Yuanhua Qiao, Fan Xu, Juncheng Chen1, Changming Wang
    2019, 16(7): 131-143.
    Abstract ( )   Knowledge map   Save
    Source localization of focal electrical activity from scalp electroencephalogram (sEEG) signal is generally modeled as an inverse problem that is highly ill-posed. In this paper, a novel source localization method is proposed to model the EEG inverse problem using spatio-temporal long-short term memory recurrent neural networks (LSTM). The network model consists of two parts, sEEG encoding and source decoding, to model the sEEG signal and receive the regression of source location. As there does not exist enough annotated sEEG signals correspond to specific source locations, simulated data is generated with forward model using finite element method (FEM) to act as a part of training signals. A framework for source localization is proposed to estimate the source position based on simulated training data. Experiments are done on simulated testing data. The results on simulated data exhibit good robustness on noise signal, and the proposed network solves the EEG inverse problem with spatio-temporal deep network. The result show that the proposed method overcomes the highly ill-posed linear inverse problem with data driven learning.
  • NETWORKS & SECURITY
    Zhenpeng Liu, Yupeng He1, Wensheng Wang, Bin Zhang
    2019, 16(7): 144-155.
    Abstract ( )   Knowledge map   Save
    SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a difficult point and focus of SDN security research. Based on the characteristics of SDN, a DDoS attack detection method combining generalized entropy and PSO-BP neural network is proposed. The traffic is pre-detected by the generalized entropy method deployed on the switch, and the detection result is divided into normal and abnormal. Locate the switch that issued the abnormal alarm. The controller uses the PSO-BP neural network to detect whether a DDoS attack occurs by further extracting the flow features of the abnormal switch. Experiments show that compared with other methods, the detection accurate rate is guaranteed while the CPU load of the controller is reduced, and the detection capability is better.
  • NETWORKS & SECURITY
    Yang Lu, Jiguo Li
    2019, 16(7): 156-173.
    Abstract ( )   Knowledge map   Save
    Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several certificateless encryption with keyword search (CLEKS) schemes have been presented in the literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security weakness in the previous frameworks and provide resistance against both inside and outside keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we design a concrete CLEKS scheme and formally prove its security in the random oracle model. Compared with previous two CLEKS schemes, the proposed scheme has better overall performance while offering stronger security guarantee as it withstands the existing known types of keyword guessing attacks.
  • EMERGING TECHNOLOGIES & APPLICATIONS
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Weijin Jiang, Yang Wang, Yirong Jiang, Jiahui Chen, Yuhui Xu, Lina Tan
    2019, 16(7): 174-194.
    Abstract ( )   Knowledge map   Save
    This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Feng Wang, Dingde Jiang, Sheng Qi
    2019, 16(7): 195-206.
    Abstract ( )   Knowledge map   Save
    The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellite-ground links to acquire information accurately, process it quickly, and transmit it efficiently. The satellite communication, as an important part of integrated information networks, is one of main approaches to acquire, process and distribute communication information and resources. In this paper, based on current researches of the satellite communication network, we put forward a 3-layer satellite communication network model based on the Software Defined Network (SDN). Meanwhile, to improve current routing policies of the Low Earth Orbit (LEO) satellite communication network, we put forward an Adaptive Routing Algorithm (ARA) to sustain the shortest satellite communication link. Experiment results show that the proposed method can effectively reduce link distance and communication delay, and realize adaptive path planning.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Wanwei Huang, Chunfeng Du, Jianwei Zhang, Changhai Wang
    2019, 16(7): 207-228.
    Abstract ( )   Knowledge map   Save
    The current Internet has evolved during the last decade to a global provider of diverse applications. However, the underlying structure of routing and addressing has not evolved in the same pace and is somewhat inflexible. How to provide diverse routing services, support emerging communication paradigms based on limited and definite network resources has become an urgent challenge. This paper investigates the adaptive matching between routing and application through network function decomposition and composition, and proposes a polymorphic routing model to support diverse applications and emerging communication paradigms. The model splits complex routing functions into its constituents, and derives customized routing mechanisms supporting various applications by composing the routing constituents. The derivation process is modeled as a Markov Decision Process (MDP), and a polymorphic derivation algorithm is also proposed to derive customized routing instances for diverse applications. The model enables the network to self-adjust routing services dynamically to adapt to the different requirements of applications, supports coexistence of multiple routing modes and communication paradigms, and provides a feasible solution for the network compatibility and evolvement. We describe the key design and demonstrate the feasibility of polymorphic derivation by simulations. We also present case studies that demonstrate key functionalities the polymorphic routing model enables.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Renchao Xie, Zishu Li, Jun Wu, Qingmin Jia, Tao Huang
    2019, 16(7): 229-244.
    Abstract ( )   Knowledge map   Save
    With the new promising technique of mobile edge computing (MEC) emerging, by utilizing the edge computing and cloud computing capabilities to realize the HTTP adaptive video streaming transmission in MEC-based 5G networks has been widely studied. Although many works have been done, most of the existing works focus on the issues of network resource utilization or the quality of experience (QoE) promotion, while the energy efficiency is largely ignored. In this paper, different from previous works, in order to realize the energy efficiency for video transmission in MEC-enhanced 5G networks, we propose a joint caching and transcoding schedule strategy for HTTP adaptive video streaming transmission by taking the caching and transcoding into consideration. We formulate the problem of energy-efficient joint caching and transcoding as an integer programming problem to minimize the system energy consumption. Due to solving the optimization problem brings huge computation complexity, therefore, to make the optimization problem tractable, a heuristic algorithm based on simulated annealing algorithm is proposed to iteratively reach the global optimum solution with a lower complexity and higher accuracy. Finally, numerical simulation results are illustrated to demonstrated that our proposed scheme brings an excellent performance.