The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l...The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.展开更多
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici...Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.展开更多
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ...In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.展开更多
Fast growth of mobile internet and internet-of-things has propelled the concept formation and research on 5G wireless communications systems which are to be standardized around 2020(IMT-2020).There will be diverse app...Fast growth of mobile internet and internet-of-things has propelled the concept formation and research on 5G wireless communications systems which are to be standardized around 2020(IMT-2020).There will be diverse application scenarios expected for 5G networks.Hence,key performance indicators(KPIs) of 5G systems would be very diverse,not just the peak data rate and average/edge spectral efficiency requirements as in previous generations.For each typical scenario,multiple technologies may be used independently or jointly to improve the transmission efficiency,to lower the cost,and to increase the number of connections,etc.Key enabling technologies are discussed which include massive MIMO,ultradense deployment specific techniques,nonorthogonal transmission,high frequency communications,etc.展开更多
Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates ...Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates DTN communications between the Earth and the far side of the Moon, by means of a lunar orbiter acting as relay. After an introductory part, the paper presents a comprehensive analysis of the DTN performance that can be achieved on the identified communication scenario. The focus is on the evaluation of the stateof-the-art ability of Interplanetary Overlay Network(ION), the NASA DTN implementation of Bundle Protocol(BP) and Contact Graph Routing(CGR), to meet the many challenges of the space communication scenario investigated(and more generally of a future interplaynetary Internet): intermittent links, network partitioning, scarce bandwidth, long delays, dynamic routing, handling of high priority and emergency traffic, interoperability issues. A study of security threats and Bundle Security Protocol(BSP) countermeasures complete the work.The many results provided, confirm the essential role of DTN in future space communications.展开更多
With the development of large numbers broadband Internet access,global satellite communications is moving towards High Throughput Satellites(HTS).Now,USA,Canada,Europe,Thailand,Japan,United Arab Emirates,Australia hav...With the development of large numbers broadband Internet access,global satellite communications is moving towards High Throughput Satellites(HTS).Now,USA,Canada,Europe,Thailand,Japan,United Arab Emirates,Australia have already developed HTS systems.However,there is little research to analyze the factors influencing high throughput.Thus,from the design perspective,the throughput of HTS and influencing factors are calculated and compared at a system level.Finally,the application of HTS is analyzed and forecasted.展开更多
In the promising cooperative communication systems,network performance is mainly affected by interference instead of noise.In this paper,we consider the performance degraded by the Poisson filed interference in the du...In the promising cooperative communication systems,network performance is mainly affected by interference instead of noise.In this paper,we consider the performance degraded by the Poisson filed interference in the dual-hop relay channels.We focus on the discussions of error outage probability (EOP) performance with a selective-decode-and-forward (SDF),amplify-and-forward (AF),or fixed-decode-and-forward (DF) cooperation protocol.Finally,the simulation results present the performance with different cooperation protocols with interference in a Poisson field.展开更多
Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order ...Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.展开更多
The invention of the World Wide Web, especially the Web 2.0, originally led some sociologists to believe that this tool would have favoured the creation of a "collective intelligence" able to spread and increase the...The invention of the World Wide Web, especially the Web 2.0, originally led some sociologists to believe that this tool would have favoured the creation of a "collective intelligence" able to spread and increase the level of democracy in the society. Nowadays, as a matter of fact, Information and Communications Technologies (ICTs) continue excluding part of the population and contribute to a top-down organisation of the main streams of information neutralising active potentialities and risking, paradoxically, to isolate users who are not aware of the mechanisms of the lnternet. The "doxic" acceptance of web contents, structures, and tools indeed precludes some kinds of knowledge and some different models of participation, with significant consequences on the social construction of reality. As a result, a tendency emerges towards a virtual-only participation and the click-tivism seems more and more to be turning into a form of slack-tivism.展开更多
Substantially long round trip time (RTT) in space channel hurts TCP interactions between the sending and receiving ends, and limits the usefulness and effectiveness of TCP feedback. Space Communication Protocol Standa...Substantially long round trip time (RTT) in space channel hurts TCP interactions between the sending and receiving ends, and limits the usefulness and effectiveness of TCP feedback. Space Communication Protocol Standards-Transport Protocol (SCPS-TP) is a Transmission Control Protocol (TCP) enhancement method aimed at improving its performance in space and interplanetary Internet and is expected to have capability of being feasible applied to experimental evaluation of the effectiveness of SCPS-TP in coping with long channel delay. This paper presents an experimental evaluation of channel delay impact on throughput performance of SCPS-TP over LEO/GEO-stationary space links using a test-bed, compared with the widely deployed TCP.展开更多
New digital technologies, especially new communication networks connected within the internet, are becoming increasingly more important as tools for management, information distribution, and as radically new models of...New digital technologies, especially new communication networks connected within the internet, are becoming increasingly more important as tools for management, information distribution, and as radically new models of cultural production. This paper takes a deep look at the Tosakan Project, a community project in Saraburi province, Thailand. This project combines concepts of folk media, digital storytelling, and the participatory model of Web 2.0 in order to solve community problems. Herein, it is shown how diverse groups in this community project work together using social network channels such as Facebook and Line to digitally tell folk stories through videos and disseminate the content to a wider audience via Facebook and other digital sharing outlets such as YouTube.展开更多
In this paper, we conduct research on the development direction of traditional broadcast television movie media under background of new media and lnternet. In recent years, with the computer technology network communi...In this paper, we conduct research on the development direction of traditional broadcast television movie media under background of new media and lnternet. In recent years, with the computer technology network communication technology and constant innovation rapid development of digital technology, digital new media got rapid development. Under the digital new media industry has gradually become the core industry of 21 st century knowledge economy and the new economic growth point. But there are still some problems in the digital of new media development. How to treat these problems to take effective countermeasures is vital to healthy development of the new media. Our research proposes corresponding guidance and the perspective on the development orientation which acts as the paradigm and the guideline.展开更多
In this paper, we conduct research on the network intrusion detection system based on the modified particle swarm optimization algorithm. Computer interconnection ability put forward the higher requirements for the sy...In this paper, we conduct research on the network intrusion detection system based on the modified particle swarm optimization algorithm. Computer interconnection ability put forward the higher requirements for the system reliability design, the need to ensure that the system can support various communication protocols to guarantee the reliability and security of the network. At the same time also require network system, the server or products have strong ability of fault tolerance and redundancy, better meet the needs of users, to ensure the safety of the information data and the good operation of the network system. For this target, we propose the novel paradigm for the enhancement of the modern computer network that is innovative.展开更多
As the future network is developing towards broadband,convergence,virtualization and intelligence,dramatic changes will happen in the network applications and its industrial chain.The rapid development of mobile Inter...As the future network is developing towards broadband,convergence,virtualization and intelligence,dramatic changes will happen in the network applications and its industrial chain.The rapid development of mobile Internet and Io T will bring about huge market requirements,while key 5G mobile communication technologies and the cloud network are ready for new breakthroughs.The integration of the 5G and cloud network will bring revolutionary changes to the future network.展开更多
基金supported by the Natural Science Foundation of Beijing under Grant No.4132048,NSFC(61472047),and NSFC(61202435)
文摘The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.
基金supported in part by the National High Technology Research and Development Program of China ("863" Program) (No.2007AA010502)
文摘Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.
基金Acknowledgements This work was supported by Research Funds of Information Security Key Laboratory of Beijing Electronic Science & Technology Institute National Natural Science Foundation of China(No. 61070219) Building Together Specific Project from Beijing Municipal Education Commission.
文摘In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.
文摘Fast growth of mobile internet and internet-of-things has propelled the concept formation and research on 5G wireless communications systems which are to be standardized around 2020(IMT-2020).There will be diverse application scenarios expected for 5G networks.Hence,key performance indicators(KPIs) of 5G systems would be very diverse,not just the peak data rate and average/edge spectral efficiency requirements as in previous generations.For each typical scenario,multiple technologies may be used independently or jointly to improve the transmission efficiency,to lower the cost,and to increase the number of connections,etc.Key enabling technologies are discussed which include massive MIMO,ultradense deployment specific techniques,nonorthogonal transmission,high frequency communications,etc.
文摘Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates DTN communications between the Earth and the far side of the Moon, by means of a lunar orbiter acting as relay. After an introductory part, the paper presents a comprehensive analysis of the DTN performance that can be achieved on the identified communication scenario. The focus is on the evaluation of the stateof-the-art ability of Interplanetary Overlay Network(ION), the NASA DTN implementation of Bundle Protocol(BP) and Contact Graph Routing(CGR), to meet the many challenges of the space communication scenario investigated(and more generally of a future interplaynetary Internet): intermittent links, network partitioning, scarce bandwidth, long delays, dynamic routing, handling of high priority and emergency traffic, interoperability issues. A study of security threats and Bundle Security Protocol(BSP) countermeasures complete the work.The many results provided, confirm the essential role of DTN in future space communications.
文摘With the development of large numbers broadband Internet access,global satellite communications is moving towards High Throughput Satellites(HTS).Now,USA,Canada,Europe,Thailand,Japan,United Arab Emirates,Australia have already developed HTS systems.However,there is little research to analyze the factors influencing high throughput.Thus,from the design perspective,the throughput of HTS and influencing factors are calculated and compared at a system level.Finally,the application of HTS is analyzed and forecasted.
基金supported by the joint state key program of the NSFC of China and the national railway ministry of China (Grant No.6083001)program for Changjiang scholars and innovative research team in University (Grant No.IRT0949)the programs of state key laboratory of traffic control and safety (RCS2008ZZ006 and RCS2008ZZ007)
文摘In the promising cooperative communication systems,network performance is mainly affected by interference instead of noise.In this paper,we consider the performance degraded by the Poisson filed interference in the dual-hop relay channels.We focus on the discussions of error outage probability (EOP) performance with a selective-decode-and-forward (SDF),amplify-and-forward (AF),or fixed-decode-and-forward (DF) cooperation protocol.Finally,the simulation results present the performance with different cooperation protocols with interference in a Poisson field.
基金supported by the project"the Cross Layer Optimization Technique for IMT-Advanced " under Grant No.2010ZX03003-001-01-03
文摘Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.
文摘The invention of the World Wide Web, especially the Web 2.0, originally led some sociologists to believe that this tool would have favoured the creation of a "collective intelligence" able to spread and increase the level of democracy in the society. Nowadays, as a matter of fact, Information and Communications Technologies (ICTs) continue excluding part of the population and contribute to a top-down organisation of the main streams of information neutralising active potentialities and risking, paradoxically, to isolate users who are not aware of the mechanisms of the lnternet. The "doxic" acceptance of web contents, structures, and tools indeed precludes some kinds of knowledge and some different models of participation, with significant consequences on the social construction of reality. As a result, a tendency emerges towards a virtual-only participation and the click-tivism seems more and more to be turning into a form of slack-tivism.
文摘Substantially long round trip time (RTT) in space channel hurts TCP interactions between the sending and receiving ends, and limits the usefulness and effectiveness of TCP feedback. Space Communication Protocol Standards-Transport Protocol (SCPS-TP) is a Transmission Control Protocol (TCP) enhancement method aimed at improving its performance in space and interplanetary Internet and is expected to have capability of being feasible applied to experimental evaluation of the effectiveness of SCPS-TP in coping with long channel delay. This paper presents an experimental evaluation of channel delay impact on throughput performance of SCPS-TP over LEO/GEO-stationary space links using a test-bed, compared with the widely deployed TCP.
文摘New digital technologies, especially new communication networks connected within the internet, are becoming increasingly more important as tools for management, information distribution, and as radically new models of cultural production. This paper takes a deep look at the Tosakan Project, a community project in Saraburi province, Thailand. This project combines concepts of folk media, digital storytelling, and the participatory model of Web 2.0 in order to solve community problems. Herein, it is shown how diverse groups in this community project work together using social network channels such as Facebook and Line to digitally tell folk stories through videos and disseminate the content to a wider audience via Facebook and other digital sharing outlets such as YouTube.
文摘In this paper, we conduct research on the development direction of traditional broadcast television movie media under background of new media and lnternet. In recent years, with the computer technology network communication technology and constant innovation rapid development of digital technology, digital new media got rapid development. Under the digital new media industry has gradually become the core industry of 21 st century knowledge economy and the new economic growth point. But there are still some problems in the digital of new media development. How to treat these problems to take effective countermeasures is vital to healthy development of the new media. Our research proposes corresponding guidance and the perspective on the development orientation which acts as the paradigm and the guideline.
文摘In this paper, we conduct research on the network intrusion detection system based on the modified particle swarm optimization algorithm. Computer interconnection ability put forward the higher requirements for the system reliability design, the need to ensure that the system can support various communication protocols to guarantee the reliability and security of the network. At the same time also require network system, the server or products have strong ability of fault tolerance and redundancy, better meet the needs of users, to ensure the safety of the information data and the good operation of the network system. For this target, we propose the novel paradigm for the enhancement of the modern computer network that is innovative.
文摘As the future network is developing towards broadband,convergence,virtualization and intelligence,dramatic changes will happen in the network applications and its industrial chain.The rapid development of mobile Internet and Io T will bring about huge market requirements,while key 5G mobile communication technologies and the cloud network are ready for new breakthroughs.The integration of the 5G and cloud network will bring revolutionary changes to the future network.