Advanced Search

2019 Vol. 41, No. 8

contents
2019, 41(8): 1-4.
Abstract:
Cryption and Information Security
Analysis Method for Concrete Security of Attribute-based Encryption Based on Learning With Errors
Jian ZHAO, Haiying GAO, Bin HU
2019, 41(8): 1779-1786. doi: 10.11999/JEIT180824
Abstract:
In order to comprehensively study the security of the Attribute-Based Encryption (ABE) scheme based on Learning With Errors (LWE) and test its ability to resist existing attacks, an analysis method for concrete security of ABE based on LWE is propose...
Improvement of a Provably Secure Mutual and Anonymous Heterogeneous Signcryption Scheme Between PKI and IBC
Suzhen CAO, Xiaoli LANG, Xiangzhen LIU, Yulei ZHANG, Caifen WANG
2019, 41(8): 1787-1792. doi: 10.11999/JEIT180982
Abstract:
Heterogeneous signcryption can ensure the confidentiality and unforgeability of information data between different cryptosystems systems. Security for the traditional Public Key Infrastructure (PKI) and Identity-Based Cryptosystem (IBC) two-way and a...
Database Ciphertext Retrieval Scheme Based on f-mOPE
Yihua ZHOU, Wen JI, Yuguang YANG
2019, 41(8): 1793-1799. doi: 10.11999/JEIT180805
Abstract:
In a cloud database environment, data is usually encrypted and stored to ensure the security of cloud storage data. To overcome the shortcomings of encrypting the data that the query overhead is big, the cipher text sortings and query are not support...
Security Analysis of 5G Network EAP-AKA′ Protocol Based on Lowe’s Taxonomy
Caixia LIU, Xinxin HU, Shuxin LIU, Wei YOU, Yu ZHAO
2019, 41(8): 1800-1807. doi: 10.11999/JEIT190063
Abstract:
Mobile network authentication protocol attacks continue to emerge. For the new 5G network protocol EAP-AKA', an EAP-AKA' security analysis method based on Lowe’s taxonomy is proposed. Firstly, 5G network, EAP-AKA', communication channel and adversary...
Searchable Multi-server CP-ABE Scheme Based on Authorization
Yulei ZHANG, Wenjing LIU, Xiangzhen LIU, Yongjie ZHANG, Caifen WANG
2019, 41(8): 1808-1814. doi: 10.11999/JEIT180944
Abstract:
Considering that the existing attribute-based searchable encryption scheme lacks the authorization service to the cloud server, a multi-server searchable Ciphertext Polity Attribute Base Encryption (CP-ABE) scheme is proposed based on authorization. ...
Anonymous Revocation Scheme for Bitcoin Confusion
Xuelian LI, Haiyu WANG, Juntao GAO, Wei LI
2019, 41(8): 1815-1822. doi: 10.11999/JEIT180874
Abstract:
In order to solve the problem that users can not request to exit during the bitcoin confusion process, an anonymous revocation scheme for Bitcoin confusion is proposed. The commitment is used to bind the user with its destination address. When the us...
Partial Blind Signcryption Scheme in CLPKC-to-TPKI Heterogeneous Environment
Caifen WANG, Qinbai XU, Chao LIU, Yudan CHENG, Bing ZHAO
2019, 41(8): 1823-1830. doi: 10.11999/JEIT180850
Abstract:
The definition and security models of partial blind signcryption scheme in heterogeneous environment between CertificateLess Public Key Cryptography (CLPKC)and Traditional Public Key Infrastructure (TPKI) are proposed, and a construction by using the...
Repair and Restoration of Corrupted Compressed Files
Gang WANG, Hua PENG, Yongwang TANG
2019, 41(8): 1831-1837. doi: 10.11999/JEIT180942
Abstract:
Data compression and decompression are widely used in modern communication and data transmission. However, how to decompress the damaged lossless compressed files is still a challenge. For the lossless data compression algorithm widely used in the ge...
Research on Network Dynamic Threat Analysis Technology Based on Attribute Attack Graph
Yingjie YANG, Qiang LENG, Dexian CHANG, Ruixuan PAN, Hao HU
2019, 41(8): 1838-1846. doi: 10.11999/JEIT181025
Abstract:
Firstly, a network Dynamic Threat Attribute Attack Graph (DT-AAG) analysis model is constructed by using Attribute Attack Graph theory. On the basis of the comprehensive description of system vulnerability and network service-induced threat transfer ...
Circuit and System Design
Hardware Security for Multi IPs Protection Based on Orthogonal Obfuscation
Yuejun ZHANG, Jiawei WANG, Zhao PAN, Xiaowei ZHANG, Pengjun WANG
2019, 41(8): 1847-1854. doi: 10.11999/JEIT180898
Abstract:
In order to solve the problem of member information leakage in multi-party cooperative design of integrated circuits, a orthogonal obfuscation scheme of multi-hardware IPs core security protection is proposed. Firstly, the orthogonal obfuscation matr...
FPGA Design and Implementation of Large Integer Multiplier
Xing XIE, Xinming HUANG, Ling SUN, Saifei HAN
2019, 41(8): 1855-1860. doi: 10.11999/JEIT180836
Abstract:
Large integer multiplication is the most important part in public key encryption, which often consumes most of the computing time in RSA, ElGamal, Fully Homomorphic Encryption (FHE) and other cryptosystems. Based on Schönhage-Strassen Algorithm (SSA)...
Wireless Communication and Internet of Things
A Priority Scheduling Scheme Based on Adaptive Random Linear Network Coding
Lian WANG, He ZHANG, Zhao ZHANG, Xunyang ZHANG
2019, 41(8): 1861-1868. doi: 10.11999/JEIT180885
Abstract:
A Priority Scheduling scheme based on Adaptive Random Linear Network Coding (PSARLNC) is proposed, to avoid the high computation complexity of the scheduling scheme based on Random Linear Network Coding (RLNC) and the high feedback dependence of the ...
Multi-controller Placement Strategy Based on Latency and Load in Software Defined Network
Jiugen SHI, Yijun XIE, Li SUN, Sheng GUO, Yali LIU
2019, 41(8): 1869-1876. doi: 10.11999/JEIT181053
Abstract:
In Software Defined Networks (SDN), latency and load are important factors for Controller Placement Problem (CPP). To reduce the transmission latency between controllers, the propagation latency and queuing latency of flow requests, and balance the c...
A Mobile Charging and Data Collecting Algorithm Based on Multi-objective Optimization
Zengwei LÜ, Zhenchun WEI, Jianghong HAN, Renhao SUN, Chengkai XIA
2019, 41(8): 1877-1884. doi: 10.11999/JEIT180897
Abstract:
Recently, the mobile charging and data collecting by using Mobile Equipment (ME) in Wireless Sensor Networks (WSNs) is a hot topic. Existing studies determine usually the traveling path of ME according to the charging requirements of sensor nodes fir...
Resource Allocation Based on Bandwidth Prediction in Software-defined Time and Wavelength Division Multiplexed Passive Optical Network
Yu XIONG, Yaya YANG, Zhenzhen ZHANG, Jing JIANG
2019, 41(8): 1885-1892. doi: 10.11999/JEIT180837
Abstract:
Considering lacking of centralized and synergistic scheduling for time-slots and wavelength resources of the inter-TWDM-PONs, a novel Resource Allocation based on Bandwidth Prediction (RABP) strategy with software-defined centralized schedule is prop...
A Model for Virtualized Network Function Placement with Hardware Acceleration Support
Yuxiang HU, Hongwei FAN, Julong LAN, Tong DUAN
2019, 41(8): 1893-1901. doi: 10.11999/JEIT180861
Abstract:
In order to deal with the limited capacity of Virtualized Network Function (VNF), hardware acceleration resources are adopted in Software-Defined Networking and Network Function Virtualization (SDN/NFV) architecture. The deployment of hardware accele...
Optimal Delay Equilibrium and Power Control Method for Two-user Non-orthogonal Multiple Access
Sheng HUANG
2019, 41(8): 1902-1908. doi: 10.11999/JEIT180818
Abstract:
A two-user single cell network employing Non-Orthogonal Multiple Access (NOMA) technique is studied. Accounting for time-varying channel fading and dynamic traffic arrival, a stochastic optimization issue is formulated, which aims to balance the queu...
Power Allocation Optimization of Cooperative Relaying Systems Using Non-orthogonal Multiple Access
Ronglan HUANG, Yun LIU, Qishang LI, Wen TANG
2019, 41(8): 1909-1915. doi: 10.11999/JEIT180842
Abstract:
A novel scheme termed Hybrid Power Allocation Strategy (H-PAS), which is integrated with Statistical Channel State Information (S-CSI) and Instantaneous Channel State Information (I-CSI), is proposed for Non-Orthogonal Multiple Access (NOMA) based on...
Adaptive Recognition Method for Unknown Interference Based on Hilbert Signal Space
Guoce HUANG, Guisheng WANG, Qinghua REN, Shufu DONG, Weiting GAO, Shuai WEI
2019, 41(8): 1916-1923. doi: 10.11999/JEIT180891
Abstract:
In order to solve the problem of classification and recognition of unknown interference types under large samples, an adaptive recognition method for unknown interference based on signal feature space is proposed. Firstly, the interference signal is ...
Radar, Navigation and Array Signal Processing
Direction of Arrival Estimation with Coprime Array Based on Toeplitz Covariance Matrix Reconstruction
Bing SUN, Huailin RUAN, Chenxi WU, Hua ZHONG
2019, 41(8): 1924-1930. doi: 10.11999/JEIT181041
Abstract:
In order to improve the utilization of non-contiguous virtual array elements in the underdetermined DOA estimation of the coprime array, a DOA estimation method based on Toeplitz covariance matrix reconstruction is proposed. First, the virtual array ...
High Frequency Surface Wave Radar Detector Based on Log-determinant Divergence and Symmetrized Log-determinant Divergence
Lei YE, Yong WANG, Qiang YANG, Weibo DENG
2019, 41(8): 1931-1938. doi: 10.11999/JEIT181078
Abstract:
High Frequency Surface Wave Radar (HFSWR) utilizes electromagnetic wave diffracting along the earth to detect targets over the horizon. However, the increase of target distance decreases the received echo energy, and this degrades the detection capab...
A W Band Mini-SAR System for Unmanned Aerial Vehicle
Manlai DING, Chibiao DING, Li TANG, Xuemei WANG, Zhilei WEN, Jiameng QU
2019, 41(8): 1939-1945. doi: 10.11999/JEIT180946
Abstract:
With the development of light and small Unmanned Aerial Vehicles (UAV), the detection method of Mini SAR based on UAV platform brings a revolutionary impact on information acquisition mode. In this paper, a W-band Mini SAR system for UAV is proposed,...
A Radiometric Calibration and Error Analysis Method for HWRS SAR at S-band
Yabo LIU, Lin LIU, Zhiyong TONG, Zhongjun YU
2019, 41(8): 1946-1951. doi: 10.11999/JEIT180983
Abstract:
The radiometric calibration of Synthetic Aperture Radar (SAR) can establish a mapping relationship between SAR image and Radar Cross Section (RCS) of ground objects, which benefits the inversion of target physical properties, and further meets the ne...
A Short Time 3D Geometry Reconstruction Method of Space Targets
Dan XU, Jixiang FU, Guangcai SUN, Mengdao XING, Tao SU, Zheng BAO
2019, 41(8): 1952-1959. doi: 10.11999/JEIT180936
Abstract:
Generally speaking, Three Dimension (3D) imaging of spinning space target is obtained by performing matrix factorization method on the scattering trajectories obtained from sequential radar images. Because of the errors of scattering center extractio...
Research on Application of Same-beam Interferometry in China Lunar Exploration
Songtao HAN, Ming CHEN, Cuilan LI, Weitao LU
2019, 41(8): 1960-1965. doi: 10.11999/JEIT180914
Abstract:
Because of restricted earth-based tracking network, Tracking, Telemetry and Command (TT&C) for lunar orbit micro-satellite is depended on Unified S/X Band (USB) antennas in China Chang’E-4 lunar exploration. Based on analysis of the geometry betw...
Research on Autonomous Integrity Monitoring Performance of Vector GNSS Receiver
Xiaojun ZOU, Baowang LIAN
2019, 41(8): 1966-1973. doi: 10.11999/JEIT180948
Abstract:
Based on the analysis on the difference between vector tracking loop and scalar tracking loop on fault detection, it is pointed out that in vector receiver of Global Navigation Satellite System (GNSS), the detection statistic of Receiver Autonomous I...
Dual-polarized Satellite Security Transmission Scheme Based on Double Layer Multi-parameter Weighted-type Fractional Fourier Transform
Xinyu DA, Haobo WANG, Zhangkai LUO, Hang HU, Lei NI, Yu PAN
2019, 41(8): 1974-1982. doi: 10.11999/JEIT181135
Abstract:
In order to improve the secure transmission performance of dual-polarized satellite communication, a secure transmission method based on Double Layer Multi-Parameter Weighted-type FRactional Fourier Transform (DL-MPWFRFT) is proposed. Two orthogonall...
Image and Intelligent Information Processing
Adaptive Regularized Correlation Filters for Visual Tracking Based on Sample Quality Estimation
Zhiqiang HOU, Shuai WANG, Xiufeng LIAO, Wangsheng YU, Jiaoyao WANG, Chuanhua CHEN
2019, 41(8): 1983-1991. doi: 10.11999/JEIT180921
Abstract:
Correlation Filters (CF) are efficient in visual tracking, but their performance is badly affected by boundary effects. Focusing on this problem, the adaptive regularized correlation filters for visual tracking based on sample quality estimation are ...
Banknote Recognition Research Based on Improved Deep Convolutional Neural Network
Shan GAI, Zhongyun BAO
2019, 41(8): 1992-2000. doi: 10.11999/JEIT181097
Abstract:
In order to improve the recognition rate of banknotes, the improved banknote recognition algorithm based on Deep Convolutional Neural Network(DCNN) is proposed. Firstly, the algorithm constructs a deep convolution layer by integrating transfer learni...
A Classifier Learning Method Based on Tree-Augmented Naïve Bayes
Xi CHEN, Kun ZHANG
2019, 41(8): 2001-2008. doi: 10.11999/JEIT180886
Abstract:
The structure of Tree-Augmented Naïve Bayes (TAN) forces each attribute node to have a class node and a attribute node as parent, which results in poor classification accuracy without considering correlation between each attribute node and the class ...
A Maximal Frequent Itemsets Mining Algorithm Based on Adjacency Table
Ming YIN, Wenjie WANG, Xuanyu ZHANG, Jijiao JIANG
2019, 41(8): 2009-2016. doi: 10.11999/JEIT180692
Abstract:
To solve the problems of Apriori algorithm and FP-Growth algorithm in the process of mining the maximal frequent itemsets, which refer to inefficient operation, high memory consumption, difficulty in adapting to the process of dense datasets, and aff...
Multi-threshold Image Segmentation of 2D Otsu Based on Improved Adaptive Differential Evolution Algorithm
Jun LUO, Yongsong YANG, Baoyu SHI
2019, 41(8): 2017-2024. doi: 10.11999/JEIT180949
Abstract:
The multi-threshold image segmentation of the classical 2D maximal between-cluster variance method has deficiencies such as large computation, long calculation time, low segmentation precision and so on. A multi-threshold segmentation of 2D Otsu base...
Compressed Sensing Image Restoration Based on Non-local Low Rank and Weighted Total Variation
Hui ZHAO, Jing ZHANG, Le ZHANG, Yingli LIU, Tianqi ZHANG
2019, 41(8): 2025-2032. doi: 10.11999/JEIT180828
Abstract:
In order to reconstruct natural image from Compressed Sensing(CS) measurements accurately and effectively, a CS image reconstruction algorithm based on Non-local Low Rank(NLR) and Weighted Total Variation(WTV) is proposed. The proposed algorithm cons...