cooperative diversity in wireless networks effient protocols and outage behavior

合集下载

DoS_攻击下具备隐私保护的多智能体系统均值趋同控制

DoS_攻击下具备隐私保护的多智能体系统均值趋同控制

DoS 攻击下具备隐私保护的多智能体系统均值趋同控制胡沁伶 1郑 宁 1徐 明 1伍益明 1何熊熊2摘 要 均值趋同是一种广泛应用于分布式计算和控制的算法, 旨在系统通过相邻节点间信息交互、更新, 最终促使系统中所有节点以它们初始值的均值达成一致. 研究拒绝服务(Denial-of-service, DoS)攻击下的分布式离散时间多智能体系统均值趋同问题. 首先, 给出一种基于状态分解思想的分布式网络节点状态信息处理机制, 可保证系统中所有节点输出值的隐私. 然后, 利用分解后的节点状态值及分析给出的网络通信拓扑条件, 提出一种适用于无向通信拓扑的多智能体系统均值趋同控制方法. 理论分析表明, 该方法能够有效抵御DoS 攻击的影响, 且实现系统输出值均值趋同. 最后, 通过仿真实例验证了该方法的有效性.关键词 多智能体系统, 均值趋同, 拒绝服务攻击, 隐私保护, 网络安全引用格式 胡沁伶, 郑宁, 徐明, 伍益明, 何熊熊. DoS 攻击下具备隐私保护的多智能体系统均值趋同控制. 自动化学报, 2022,48(8): 1961−1971DOI 10.16383/j.aas.c201019Privacy-preserving Average Consensus Control forMulti-agent Systems Under DoS AttacksHU Qin-Ling 1 ZHENG Ning 1 XU Ming 1 WU Yi-Ming 1 HE Xiong-Xiong 2Abstract Average consensus is a widely used algorithm for distributed computing and control, where all the nodes in the network constantly communicate and update their states in order to achieve an agreement. In this paper, we study the average consensus problem for discrete-time multi-agent systems under DoS attacks. First, a distributed network node state value processing mechanism based on state decomposition is given, which can ensure the pri-vacy of the output values of all nodes in the system. Then, through using the decomposed node state values and the network topology conditions given by the analysis, an average output consensus control law for distributed discrete-time multi-agent systems is proposed. Theoretical analysis shows that the proposed method can effectively resist the influence of DoS attacks on the system, and achieve the convergence of the average value of system initial outputs.Finally, numerical examples are presented to show the validity of the proposed method.Key words Multi-agent systems, average consensus, denial-of-service attack, privacy-preserving, cyber securityCitation Hu Qin-Ling, Zheng Ning, Xu Ming, Wu Yi-Ming, He Xiong-Xiong. Privacy-preserving average con-sensus control for multi-agent systems under DoS attacks. Acta Automatica Sinica , 2022, 48(8): 1961−1971多智能体系统是由多个具有一定传感、计算、执行和通信能力的智能个体组成的网络系统, 作为分布式人工智能的重要分支, 已成为解决大型、复杂、分布式及难预测问题的重要手段[1−2]. 趋同问题作为多智能体系统分布式协调控制领域中一个最基本的研究课题, 是指在没有协调中心的情况下, 系统中每个节点仅根据相互间传递的信息, 将智能体动力学与网络通信拓扑耦合成复杂网络, 并设计合适的分布式控制方法, 从而在有限时间内实现所有节点状态值的一致或同步.然而具备分布式网络特点的多智能体系统由于普遍规模庞大, 单个节点结构简单且节点地理位置分散等原因, 使得系统中易产生脆弱点, 这就使其在推广应用中面临两项基本挑战: 1)节点状态信息的隐私泄露问题; 2)节点或节点间的通信链路可能会遭受网络攻击的问题, 如欺骗攻击、拒绝服务(Denial-of-service, DoS)攻击等.针对节点状态信息的隐私泄露问题, 即在考虑多智能体网络趋同的同时, 保证系统中节点的初始状态值不被泄露, 已有较多研究人员开展相关的工作. 其中, 有学者借助于传统的安全多方计算方法,收稿日期 2020-12-09 录用日期 2021-03-02Manuscript received December 9, 2020; accepted March 2, 2021国家自然科学基金(61803135, 61873239, 62073109)和浙江省公益技术应用研究项目(LGF21F020011)资助Supported by National Natural Science Foundation of China (61803135, 61873239, 62073109) and Zhejiang Provincial Public Welfare Research Project of China (LGF21F020011)本文责任编委 鲁仁全Recommended by Associate Editor LU Ren-Quan1. 杭州电子科技大学网络空间安全学院 杭州 3100182. 浙江工业大学信息工程学院 杭州 3100231. School of Cyberspace, Hangzhou Dianzi University, Hang-zhou 3100182. College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023第 48 卷 第 8 期自 动 化 学 报Vol. 48, No. 82022 年 8 月ACTA AUTOMATICA SINICAAugust, 2022例如Yao等[3]提出混淆电路算法, Shamir等[4]提出秘钥共享算法等. 然而这类通用的隐私保护方法因计算和通信消耗较大, 不适用于单个智能体节点结构较为简单的分布式系统, 尤其是受到硬实时约束的一类多智能体系统应用. 如上述的混淆电路的计算延迟为秒级[5], 而对于多智能体系统一些典型应用如多无人飞行器编队的实时控制, 其容许的计算延迟仅为毫秒级[6]. 针对多智能体系统均值趋同过程中节点信息泄露问题, 有研究人员提出了一系列专门的隐私保护策略[7−10]. 这些方法大多基于模糊处理的思想, 即通过加入噪声来掩盖真实的状态值.其中一种常用的手段是差分隐私方法[11], 然而这种差分隐私下的模糊处理方法会影响最终趋同值的精度, 即使系统无法收敛到精确的节点初始状态的平均值. 最近文献[12]提出的一种基于相关噪声混淆技术的改进方法, 克服了传统差分隐私方法中精度下降的问题, 但却需要较多的算力. 最近的文献[13]采用一种基于状态分解的方法, 将每个节点的初始状态分解为两个随机的子状态, 只令其中一个子状态参与相邻节点间的信息交互, 而另一子状态保留在本节点内部, 不参与邻居间信息传递. 只要两个随机子状态的和满足特定条件, 在作者所设计的趋同算法下, 系统能够达成均值趋同, 且保护每个节点的状态信息不被泄露.此外, 有学者研究基于可观测性的方法用来保护多智能体系统中节点的隐私[14−16]. 基本思想是设计网络的交互拓扑结构以最小化某个节点的观测性, 本质上相当于最小化该节点推断网络中其他节点初始状态的能力. 然而, 这类基于可观测性的方法仍然存在隐私泄露的风险. 为了提高对隐私攻击的抵御能力, 另一种常见的方法是使用加密技术.然而, 虽然基于密码学的方法可以很容易地在聚合器或第三方[17]的帮助下实现隐私保护, 例如基于云的控制或运算[18−20], 但是由于分散密钥管理的困难,在没有聚合器或第三方的情况下, 将基于密码学的方法应用到完全分散的均值趋同问题是很困难的.同时, 基于密码学的方法也将显著增加通信和计算开销[21], 往往不适用于资源有限或受硬实时约束的分布式网络控制系统.以上的工作均是在安全的通信环境下完成的,然而在实际应用场景中, 由于物理设备和通信拓扑结构都有可能遭受网络攻击, 导致以往有关多智能体系统趋同研究的失效, 这使得针对多智能体系统在网络攻击下的趋同研究发展迅速, 并取得了一些显著成果[22−26]. 目前多智能体系统中常见的网络攻击主要有两种形式: 欺骗攻击[22, 25, 27−28]和DoS攻击[29−33].r其中DoS攻击是多智能体系统中最常见也是最容易实现的攻击形式, 只要攻击者掌握系统元器件之间的通信协议, 即可利用攻击设备开展干扰、阻塞通信信道、用数据淹没网络等方式启动DoS攻击.在DoS攻击影响下, 智能体间交互的状态信息因传递受阻而致使系统无法达成一致. 近年来, 研究者们从控制理论的角度对DoS攻击下的系统趋同问题进行了研究. 其中, 有研究人员通过构建依赖于参数的通用Lyapunov函数设计一种趋同方法[31],使其能够适用于因通信链路存在随机攻击导致通信拓扑随机切换的情况. 此外, 有研究者通过设计一个独立于全局信息的可靠分布式事件触发器[32], 很好地解决了大规模DoS攻击下的一致性问题. 更有研究者开始研究异构多智能体系统在通信链路遭受攻击时的趋同问题[33], 通过设计基于观测器的控制器, 实现在通信链路存在DoS攻击时两层节点间的趋同问题. 而在本文中, 考虑多智能体之间通信链路遭受DoS攻击的情况, 通过攻击开始时刻与攻击链路矩阵刻画DoS攻击模型, 通过增强网络拓扑以满足所谓的-鲁棒图来刻画信息流的局部冗余量[34],从而抵御DoS攻击的影响.然而, 针对趋同问题, 将网络攻击和隐私保护两者结合起来考虑的研究还鲜有见文献报道. 2019年Fiore等[24]率先开展了同时考虑隐私保护和网络攻击的研究工作, 但所得成果仍存在一定的局限性: 1)所提方法虽能保护节点隐私且最终达成状态值趋同, 却无法确保系统达成均值趋同; 2)作者仅考虑了欺骗攻击下的控制器设计问题, 因此所得结论并不适用于网络中存有DoS攻击的系统.y基于上述观察与分析, 本文主要致力于研究DoS 攻击下具备节点信息隐私保护的多智能体系统均值趋同问题, 从而补充现有趋同算法的相关结果. 同时, 考虑实际环境对测量条件等的限制, 不易直接获取节点的真实状态值[35], 为此本文围绕节点的输出值, 即通过观测矩阵获取的系统输出, 进行趋同控制器的设计工作. 本文的主要贡献包括:1)针对DoS攻击在多智能体系统分布式协同控制中的攻击特性和发生范围, 及对网络拓扑连通性的影响, 建立相应数学模型;2)针对一类DoS攻击下的无向通信网络多智能体系统, 提出一种基于状态分解的节点信息隐私保护策略. 当满足特定条件时, 所提策略可确保系统输出状态不被窃听者准确推断出来;y3)针对DoS攻击的影响, 分析给出了系统中节点通信拓扑的鲁棒性条件, 并据此设计一种基于输出量测值的分布式控制方法, 理论分析并证明1962自 动 化 学 报48 卷系统可容忍特定数目的链路遭受DoS 破坏, 并实现输出均值趋同.本文内容结构为: 第1节介绍本文所需要用到的图论知识, 网络拓扑图的相关性质以及均值趋同算法; 第2节主要对DoS 攻击模型和拟解决问题进行描述; 第3节提出系统在DoS 攻击下的隐私保护均值趋同控制方法, 并分别对在攻击下的网络拓扑鲁棒性、系统收敛性以及隐私保护能力进行分析;第4节通过一组仿真实例验证算法的有效性; 第5节是总结与展望.1 预备知识1.1 图论知识M G =(V ,E ,A )V ={v 1,v 2,···,v M }E ⊂V ×V A =[a ij ]∈R M ×M (v j ,v i )∈E a ij >0a ij =0(v j ,v i )∈E (v i ,v j )∈E a ij =a ji a ii =0v i N i ={v j ∈V|(v j ,v i )∈E}G L =D −A 考虑由 个智能体组成的多智能体系统, 节点之间为双向传递信息, 其通信网络可抽象地用一个无向加权图 表示. 其中 表示节点集合, 表示边集. 两个节点之间的连接关系用邻接矩阵(权重矩阵) 表示, 如果 , 则 ; 否则 . 在无向图中, 邻接矩阵是对称的, 即如果, 则同时有 , 且 . 本文不考虑节点自环情况, 即令 . 节点 的邻居集合表示为 . 无向图 对应的Laplacian 矩阵为 , 其中D 为度矩阵, 定义为:除了上述无向图的基本知识, 本文的研究工作还用到了r -可达集合和r -鲁棒图的概念. 这两个概念最早由文献[36]提出, 随后被文献[22, 27]等利用并扩展, 主要用于分析节点间拓扑抵御网络攻击的鲁棒性. 经笔者少许修改, 具体定义如下:G =(V ,E )S ⊂V S v i N i \S r S 定义1[36]. r -可达集合: 对于图 及其中一非空子集 , 如果 中至少有一个节点 在集合 中有不少于 个节点, 则称 为r -可达集合.G =(V ,E )V S 1,S 2⊂V S 1∩S 2=∅G 定义 2[36]. r -鲁棒图: 对于图 , 如果对 中任意一对非空子集 , , 保证至少有一个子集为r -可达集合, 则称 为r -鲁棒图.以下是一些关于r -鲁棒图的基本性质.G =(V ,E )ˆGG s (s <r )ˆG(r −s )引理1[22]. 考虑一个r -鲁棒图 , 令 表示 中每个节点至多移除 条边后的图,则 是一个 -鲁棒图.G G 引理2[22]. 对于一个无向图 , 如果 满足1-鲁G 棒图, 则有 为连通图.1.2 均值趋同算法M x i [k ]∑Mi =1x i [0]/M 考虑有 个节点组成的无向加权多智能体系统. 为了让系统实现均值趋同, 也就是所有节点的状态 最终收敛到它们初始状态的平均值, 根据文献[13, 37], 其节点动态更新方程可设计为:x i [k ]v i k ε∈(0,1/∆)∆式中, 为节点 在 时刻的状态值, 为系统增益系数, 通常定义为:η>0η≤a ij <1文献[38]表明, 当系统拓扑满足连通图, 且存在 使得 时,系统可在更新规则(1)下实现均值趋同, 即:2 问题描述M 本文研究对象为如下 个智能个体组成的一阶离散时间多智能体系统, 其动力学模型为:x i [k ]∈R N u i y i [k ]∈R Q y i [k ]nC i ∈R Q ×N n n ∈R +式中, 为系统的状态值, 为控制输入, 为系统经通信链路传输得到的量测信号, 需要注意的是, 由于通信链路中存在DoS 攻击, 可能遭受影响而无法被邻居节点接收到. 为观测矩阵, 其中 为从观测矩阵中抽取出的系数, 为大于0的正实数.2.1 攻击模型本文所讨论的DoS 攻击表现为某种传输尝试失败的情况[39], 其存在于多智能体系统中各智能体之间的通信链路中, 即当通信图中两个节点间的链路发生DoS 攻击时, 其通信链路将会被切断, 此时两个节点无法通过该链路进行信息交互, 进而达到攻击多智能体系统的目的. 在多智能体系统分布式协同控制中, 运载节点输出量测值的通信链路遭遇DoS 攻击的示意图如图1所示.(P,k 0)P =[p ij [k ]]∈R M ×M v i v j k 本文以Adeversory 刻画系统遭遇DoS攻击的情况. 其中 表示攻击状态矩阵, 当节点 和节点 之间在 时刻发生DoS8 期胡沁伶等: DoS 攻击下具备隐私保护的多智能体系统均值趋同控制1963p ij [k ]=0p ij [k ]=1k 0攻击时, ; 否则 . 为系统遭遇DoS 攻击的开始时刻.考虑攻击者资源的有限, 本文假设攻击发生范围满足f -本地有界[22]的定义, 该假设在文献[22−23,25]中被广泛采用. 结合DoS 攻击, 具体定义如下:f 定义3 (f -本地有界DoS 攻击) . 对于系统中的任一节点, 如果与其相邻节点的通信链路中, 任意时刻遭遇DoS 攻击的链路条数至多不超过 条, 则称此类攻击模型为f -本地有界DoS 攻击.2.2 系统假设(P,k 0)结合上述给出的Adeversory 和攻击发生范围模型, 本文对所研究的系统作出如下假设:f 3v i ∈V k 假设1. 系统中任意一个节点的通信链路中在任意时刻至多有 条链路同时遭受DoS 攻击, 即满足定义 攻击模型. 具体地, 则对于任意 , 在任意时刻 , 都有下式成立:G [k ]=(V ,E [k ],A [k ])虽然本文考虑的是固定无向拓扑, 但在DoS攻击影响下, 可以看到系统的通信图却会与之发生变化. 因此, 本文接下去用时变图符号 表示系统在DoS 攻击影响下的真实通信情况.η0<η<1i,j ∈{1,···,M }a ij [k ]>0η≤a ij [k ]<1假设2. 存在一个标量 满足 , 对于所有的 , 如果 , 那么 .x i ∈R N X i ∈R N X =∩M i =1X i X =∅假设3. 系统任意节点状态值 受限于一个非空闭凸集, 表示为 , 令 ,则 .根据上述假设, 可以得出系统具备如下属性:引理3[38]. 当系统的网络通信图为有向连通图v i ∈V (1)且邻接矩阵为双随机矩阵时, 并且满足假设2和3时, 那么对于系统中任意节点 在动态更新式 下, 有:{h [k ]}式中, 为一个定义的辅助序列, 对于每个时根据文献[38], 因邻接矩阵为双随机矩阵, 由式(7) ~ (8)可得:v i ∈V 引理4. 当系统的网络通信图为无向连通图, 并且满足假设2和3时, 那么由引理3可知, 对于系统中任意节点 在动态更新式(1)下, 式(10)仍然成立.证明. 根据引理3可知, 在网络通信图为有向图情况下, 邻接矩阵为双随机矩阵表明在该网络通信图中, 所有节点通信链路满足出度等于入度的条件, 而在无向图中, 该条件同样成立, 因此在无向图中, 式(10)仍然成立. □针对上述建立的网络攻击模型和相关的系统假设, 本文的研究目标是, 设计一种控制策略, 使得:1)系统的输出达到趋同并且趋同值是等于所有智能体初始输出状态的平均值; 2)在整个趋同过程中保护每个节点的信息值隐私.3 控制器设计3.1 DoS 攻击下网络拓扑鲁棒性条件首先对网络通信链路图的鲁棒性条件进行讨论, 以便于开展后续控制器的设计工作.引理5. 考虑多智能体系统(4), 如果其网络拓图 1 DoS 攻击下的多智能系统框图Fig. 1 The diagram of the multi-agent systemunder DoS attacks1964自 动 化 学 报48 卷(f +1)扑结构满足 -鲁棒的无向图, 那么系统在遭受f -本地有界DoS 攻击下, 即满足假设1, 其通信图仍可保持连通性.f 证明. 根据假设1可知, 网络中每个节点任意时刻至多有 条通信链路遭受DoS 攻击破坏. 再由引理1可知, 此时网络拓扑结构至少是1-鲁棒图.最后由引理2可知, 系统网络拓扑仍然能够保持连通性. □3.2 DoS 攻击下隐私保护控制上述小节给出了系统遭受DoS 攻击下通信网络仍旧保持连通的条件, 接下去本小节给出本文核心的控制器设计方法.x i x αi x βi x αi [0]x βi [0]x αi [0]+x βi [0]=2x i [0]受文献[13]启发, 此处引入状态分解方法: 将每个节点的状态值 分解成两个子状态, 用 和 表示. 值得注意的是, 初始状态的子状态值 和 可在所有实数中任取, 但需满足条件: .x αi x i v i x βi x αi x βi v i v 1x α1x 1x β1v 1x α1x αi x βi a i,αβ[k ]a i,αβ[k ]η≤a i,αβ[k ]<1为便于理解, 本文以5个节点的无向连通图为例, 通信拓扑如图2所示. 从示例图中可以看出: 子状态 充当原 的作用, 即与邻居节点进行信息交互, 并且实际上是节点 的邻居节点唯一可以获知的状态信息. 而另一个子状态 同样存在于该分布式信息交互中, 但是其仅与 进行信息交互. 也就是说子状态 的存在, 对于节点 的邻居节点是不可见的. 例如, 在图2(b)中, 节点 中的 相当于图2(a)中 的角色和邻居节点进行信息交互,而 仅对节点 自身可见, 而对其他节点不可见.但是它又可以影响 的变化. 两个子状态 和 之间的耦合权重是对称的, 表示为 , 并且所有的 满足 .基于上述方法, 本文给出具体的具备隐私保护的输出均值趋同控制协议:并且I L ′[k ]式中, 为单位矩阵, 为DoS 攻击下的Lapla-cian 矩阵,其满足:A ′[k ]=[′]式中, DoS 攻击下系统对应的邻接矩阵为D ′[k ]A ′[k ] 为对应于邻接矩阵 的度矩阵.y [k ]=nCx α[k ]C 另外, 在协议(11)中, 为系统的状态输出方程, 为输出方程的观测矩阵, 定义为:e i R M i i 式中, 表示 中第 个规范基向量, 该向量中第个位置数为1, 其他位置数为0.n ∈(0,1)n =1n ∈(1,∞)注1. 考虑实际环境中不同情况, 当 时, 系统输出方程将会缩小状态值进行信息交互,适用于节点状态值过大的情况; 当 时, 系统状态输出方程将会输出原本节点需要进行信息交互的状态值; 当 时, 系统状态输出方程将会放大状态值进行信息交互, 适用于节点状态值过小的情况.x α[k ]值得注意的是, 对于系统中的节点, 用于和邻居节点进行信息交互的状态值 是无法被邻居节点获取的, 需通过系统状态输出方程传递给邻居图 2 5个节点组成的示例图Fig. 2 Example of network with 5 nodes8 期胡沁伶等: DoS 攻击下具备隐私保护的多智能体系统均值趋同控制1965x α[k ]y [k ]节点. 简言之每个节点经过信息交互接收到的邻居节点的值并不是 , 而是经过输出方程输出的 .A αβ[k ]v i ,i =1,2,···,M x αi [k ]x βi [k ]a i,αβ[k ]令 为每个节点 的和两个子状态之间的耦合权重N =1,Q =1为便于叙述, 本文考虑节点的状态值及输出值为一维的情况, 即令 . 从而, 基于输出状态值的控制协议可表示为:事实上, 只要向量状态中的每个标量状态元素都有独立的耦合权重, 本节所提出的控制方法所有分析及结果同样适用于向量状态的情况.()ε1/∆1/(∆+1)注2. 与文献[13, 37]的更新式(1)相比, 本文给出的协议(19)中, 由于每个可见子状态的邻居数增加了一个 不可见子状态 , 因此 的上限从 降低为 .注3. 相比于文献[13, 37]设计的更新式(1),本文在协议(19)的设计过程中考虑了系统通信链路中存在DoS 攻击的情况, 可确保在存在一定能力DoS 攻击时, 系统在协议(19)的约束下实现均值趋同.3.3 输出均值趋同分析在给出本文主要结论前, 需要下述引理知识.引理6. 考虑多智能体系统(4), 如果其网络通信图是一个无向连通图, 则对于状态分解后的网络,所有节点子状态总和是固定不变的.y i [k ]=nx αi [k ]证明. 由输出方程 , 推导可得:再将式(20)代入式(19), 可得:进一步, 由式(21), 可得:因此有:∑M i =1{∑Mj =1a ′ij[k ](y j [k ]−y i [k ])}而在式(23)中的部分, 可进一步分解为下式:a ′ij [k ]=a ′ji [k ]v i ,v j ∈V 根据无向图属性: , 对于任意 , 有:将式(25)代入式(24), 可得:1966自 动 化 学 报48 卷(26)(23)将式 代入式 , 可得:由式(27)容易看出, 对于进行状态分解后的网络, 系统节点子状态的和是固定不变的. □下面给出本文的主要结论.(f +1)定理1. 考虑DoS 攻击下多智能体系统(4), 在满足假设1、2和3条件下, 若其通信拓扑满足 -鲁棒图, 且系统节点在所给的分布式协议(19)下进行状态更新, 则系统可实现输出值均值趋同.(f +1)证明. 由于系统的通信图是一个 -鲁棒图, 根据引理5可知, 系统在满足假设1的DoS 攻击下, 其网络图仍能够保持连通. 显然, 经过状态分解之后的系统同样能够保证网络图的连通性. 根据x αi [k ]x βi [k ]随后, 根据引理4和式(28)可知, 系统可以实现均值趋同, 即任意节点的子状态 和都x αi [0]+β再根据式(28)和状态分解约束条件y i [k ]=nx αi [k ]最后, 根据式(29)和输出方程 , 可得: □y 注4. 相比于文献[13]设计的隐私保护状态更新协议, 本文在协议(19)的设计过程中进一步考虑了在实际环境对测量条件等的限制导致难以获得系统中节点的真实状态值的情况, 引入了节点输出值的概念, 通过观测矩阵获取的系统输出 进行协议(19)的设计, 可确保系统在该协议下实现输出值均值趋同.3.4 隐私保护分析本节对趋同控制过程中单个节点信息的隐私保护进行分析. 本文考虑两种隐私窃听者: 好奇窃听者和外部窃听者. 好奇窃听者是指一类能够正确遵循所有控制协议步骤但具有好奇性的节点, 这类节点会收集接收到的数据并试图猜测其他节点的状态信息. 而外部窃听者是指一类了解整个网络拓扑结构的外部节点, 并能够窃听某些内部节点的通信链路从而获得在该通信链路交互的信息.一般来说, 这里的外部窃听者比好奇窃听者更具有破坏力, 因为外部窃听者会窃听多个节点通信链路上交互的信息, 而好奇窃听者只能窃听该节点通信链路交互的信息, 但好奇窃听者有一个外部窃听者无法得知的信息, 即该好奇窃听者的初始状态值.v i ∈V k I i [k ]={a ′ip [k ]|v p ∈N i ,y p [k ]|v p ∈N i ,x i [k ],x αi [k ],x βi [k ],a i,αβ[k ]}v i I i =∪∞k =0I i [k ]定义好奇窃听者 在第 次迭代时所获得的信息为: . 随着状态值迭代更新, 窃听者 收集获得的信息表示为 .x i [0]v i 定义4. 如果窃听者无法以任何精度保证估计节点状态信息 的值, 则称节点 得到了隐私保护.在给出结论前, 需要用到下述引理.v j v i v m v j x j [0]=x j [0]v i I i =I i 引理7[13]. 在采用状态分解方法的信息交互通信中, 如果正常节点 具有至少一个不与好奇窃听节点 直接相连的正常邻居节点 , 则对于节点 的任意初始状态 , 窃听节点 获得的信息始终满足 .v j v m a jm [0]v j a jm [0]a j,αβ[0]a m,αβ[0]v j x j [0]引理8[13]. 在采用状态分解方法的信息交互通信中, 如果正常节点 存在至少一个正常邻居节点, 其 的值对于外部窃听者不可见, 则节点 的任意初始状态的任何变化都可以完全通过对外部窃听者不可见的 , 和 的变化来补偿, 因此外部窃听者无法以任何精度保证估计正常节点 的初始状态值 .v j ∈V v j x j [0]定理2. 考虑DoS 攻击下多智能体系统(4), 对于系统中任意正常节点 , 如果 在所给的分布式协议(19)下进行状态更新, 则在整个信息交互过程中, 其状态信息值 具备隐私保护.v i v j x j [0]=x j [0]I i =I i v j v j x j [0]证明. 首先, 分析系统存在好奇窃听者 的情况. 对于任意正常节点 , 在所给的分布式协议(19)下, 其初始状态显然满足 , .再由引理6可知, 该条件下好奇窃听者无法准确估计节点 的初始值, 因此节点 的状态值 得到了隐私保护.v j ∈V v j v j 随后, 分析系统存在外部窃听者的情况. 在本文所提的分布式算法(19)下, 外部窃听者对于系统中任意正常节点 的其中之一子状态不可见. 根据引理7, 初始状态值的变化则对于外部窃听者不可见, 故外部窃听者无法准确估计正常节点 的8 期胡沁伶等: DoS 攻击下具备隐私保护的多智能体系统均值趋同控制1967。

无线网络中的多跳协作机制

无线网络中的多跳协作机制
c a n ls t n omain h n e t e if r t .MCM d s f n e e t r a c s h rc e i iso r ls h n e ,S h t n b e e it r a o ma e u eo h r nl b o d a t a a trs c f ee sc a n l Ot a a l dt e — i y c t wi e h n me i t o e a h n o i e i n st a e e s n y te p e e i g n d si e a h i ,a d f r a d d t er c v d ae n d st c c e a d c mb n d sg a h t r e tb h r c d n o e n ar ly c a n n o w r e e o — o l w h e e i n l.An te ly d t e r t a a ay i n i lt n a ay i t rv h e sbl y a d ef cie e so e p o r d sg as d i mpo e h o ei l n lssa d s c mua i n l ss o p o e t e fa i i t n f t n s ft r — o i e v h p s d s h me h e u t s o h tt e MC c n i r v h a k td l ey r t n h v r g n — — n h o g p t o e c e .T e r s l h w t a h M a mp o e t e p c e ei r ai a d t e a e a e e d t e d t ru h u s v o o
Ho e e ,i i i iu t oo t i h h n e tt n omain i r c ieb c u e w rl s h n e t t i s n a e u l h n w v r t sd f c l t b an t e c a n ls e if r t n p a t a a s iee sc a n lsae n t t n o syc a — f a o c a

隐蔽无线通信综述

隐蔽无线通信综述

第21卷第5期信息工程大学学报Vol.21No.52020年10月Journal of Information Engineering UniversityOct.2020㊀㊀收稿日期:2020-07-09;修回日期:2020-07-21㊀㊀基金项目:国家重点研发计划资助项目(2017YFB0801903);国家自然科学基金资助项目(61501516,61701538,61871404,61801435,61601514);国家自然科学基金创新群体资助项目(61521003)㊀㊀作者简介:赵㊀华(1979-),女,博士生,主要研究方向为隐蔽无线通信㊂DOI :10.3969/j.issn.1671-0673.2020.05.002隐蔽无线通信综述赵㊀华,林钰达,金㊀梁,钟㊀州(信息工程大学,河南郑州450001)摘要:在一些高安全等级的无线通信场景中,隐蔽无线通信能够通过抵御第三方非法检测以构筑无线通信的首道安全防线㊂首先阐述了隐蔽无线通信的基础理论;其次,按5个方向对该领域的系统研究成果进行了分类介绍,重点论述研究现状的同时,指出了仍待解决的研究问题;然后,对隐蔽无线通信技术在一些特殊场景中的应用进行了归纳和分析;最后,指出了隐蔽无线通信研究正面临的挑战以及潜在的研究方向㊂关键词:隐蔽无线通信;基础理论;系统研究;技术应用;隐蔽网络中图分类号:TN918.91㊀㊀㊀文献标识码:A文章编号:1671-0673(2020)05-0520-06Covert Wireless Communication :A Review ZHAO Hua,LIN Yuda,JIN Liang,ZHONG Zhou(Information Engineering University,Zhengzhou 450001,China)Abstract :In some high security wireless communication scenarios,covert wireless communicationcan build the first defense line of communication by resisting the third party s illegal detection.The basic theory is first described.Second,the systematic research results in this field are divided into five parts for classification,focusing on the research status of each part and pointing out the researchproblems to be solved.Then the application of covert wireless communication technology in some special scenes is summarized and analyzed.Finally,the challenges and potential research directionsof covert wireless communication are pointed out.Key words :wireless covert communication;basic theory;system research;technical application;covert network0㊀引言保护无线通信免受敌方窃听一直是通信安全领域重点关注的问题㊂在一些特殊的通信场景中,仅仅通信行为的暴露都可能会带来难以预估的风险和损失㊂隐蔽无线通信凭借其隐藏通信行为的特殊优势,满足了日益增长的无线通信隐蔽性需求㊂隐蔽无线通信是一种通过运用多种信号处理手段以实现敌方低概率检测的无线通信技术㊂不同于隐写术㊁数字水印㊁网络隐蔽通信等现代信息隐藏技术,它并不借助于第三方多媒体信息掩体在高层实现信息比特隐藏,而是直接在物理层实现无线信号的低检测概率,其掩体一般是背景噪声或干扰信号㊂另外与物理层安全技术相比,它们都是在物理层上实现保障通信安全的有效手段,但物理层安全保护的是私密通信内容,㊀第5期赵㊀华,等:隐蔽无线通信综述521㊀而隐蔽无线通信保护的则是更基础㊁更广泛的合法通信行为[1]㊂以扩频通信为代表的隐蔽无线通信在两次世界大战中大展身手,但是扩频通信所实现的隐蔽性在理论上从未得到证实,其隐蔽传输能力也是未知的,直到2013年Bash B A[2]发现的隐蔽无线通信平方根律回答了这一疑惑㊂近年来,该领域越来越被国外研究团队所重视,虽然国内的研究起步较晚,但相关研究成果也逐渐开始涌现㊂近年来隐蔽无线通信的最新理论研究成果及研究脉络,如图1所示,涵盖基础理论研究㊁隐蔽系统研究和隐蔽技术应用三大块㊂本文首先介绍了平方根律为代表的隐蔽无线通信基础理论;其次,将目前该领域的系统研究成果分成了5个方向,依次分类介绍并指出其仍需解决的研究问题;然后,针对隐蔽无线通信技术的潜在应用研究,归纳和分析了一些典型应用场景;最后,结合本文梳理的研究现状及相应分析,指出了隐蔽无线通信正面临的挑战,讨论了未来可能的研究方向㊂图1㊀隐蔽无线通信研究成果分类1㊀隐蔽无线通信基础理论作为新一轮隐蔽无线通信理论研究的发起者,Bash B A首先发现并证明了平方根律,回答了隐蔽无线通信的基本问题:加性高斯白噪声(Additive White Gaussian Noise,AWGN)信道下,合法用户通过n次信道使用,最多能可靠且隐蔽地传输O(n)bits信息至接收方,其中O(n)表示紧上界为n㊂不难发现,隐蔽容量η与信道使用次数n相关,当n趋于无穷时,容易得到隐蔽速率:R=limnңɕO(n)/n=0(6)不同于香农定理证明的信道容量,平方根律揭示了AWGN信道下的零隐蔽容量,给出了AWGN 信道下n次信道使用的理论极限,并随后在各类无线信道下得到了进一步研究和拓展,具体包括二进制对称信道(Binary Symmetric Channel,BSC)[3]㊁离散无记忆信道(Discrete Memoryless Channel, DMC)[4]㊁多址接入信道(Multiple Access Channel, MAC)[5]㊁多输入多输出(Multiple-Input Multiple-Output,MIMO)AWGN信道[6]㊁泊松分组信道(Poisson Packet Channels,PPC)[7]和经典量子信道(Classical Quantum Channel,CQC)[8]等㊂以上平方根律的拓展和推导以及相关研究结论不再做详细展开㊂隐蔽无线通信其它基础理论研究也得到了相应的开展和深入㊂文献[9]从信息论的角度研究了隐蔽无线通信中的最优发射信号分布㊂文献[10]研究了隐蔽性度量问题,相较于采用一般的相对熵作为隐蔽性度量指标[11],该文提出了基于一阶和二阶渐近性的其它3种隐蔽性度量,并对比了它们对系统通信速率极限的影响㊂另外,像信道分解编码[12]㊁隐蔽密钥生成[13]等一些基础理论研究也为后续隐蔽无线通信的理论深化奠定了基础㊂522㊀信息工程大学学报㊀2020年㊀2㊀隐蔽无线通信系统研究随着近年来相关基础理论研究不断得到开展和丰富,尤其是平方根律在给出隐蔽传输理论界限的同时揭示了零隐蔽容量,这极大地推动了关于具有正隐蔽容量的通信系统的研究㊂目前,隐蔽无线通信系统研究的一般流程如图2所示,可以大致归纳为通信系统建模和系统性能优化两大块,共7个步骤㊂基于目前隐蔽通信系统研究成果在这7个环节的创新和提升,本节将该研究方向分为5个方面进行分类论述,且存在部分交叉重叠㊂图2㊀隐蔽无线通信系统研究的一般流程2.1㊀基于噪声不确定性基于噪声不确定性的隐蔽无线通信㊂对噪声功率缺乏确定的了解被称为噪声不确定性㊂文献[14]最早研究了Willie噪声不确定时的隐蔽无线通信,发现系统正隐蔽速率是可达的,并进一步分析了Willie所需采集的最佳样本数㊂由于文献[14]只研究了Willie检测性能最差时的情形,文献[15]在考虑噪声不确定性有界和无界两种模型同时,采用最小平均检错概率描述Willie最优检测性能,研究发现增大噪声不确定程度能够提升系统隐蔽性能㊂在实际通信场景中,由于温度变化㊁环境噪声变化和校准误差等原因,噪声不确定几乎不可避免,因此研究噪声不确定性对隐蔽无线通信的影响以及设计噪声不确定时的隐蔽无线通信方案具有现实意义和必要性㊂2.2㊀基于信道不确定性基于信道不确定性的隐蔽无线通信㊂信道不确定性一般是由于系统的信道估计误差造成的㊂文献[16]考虑将信道分为确定部分和不确定部分,并引入第三方Carol的通信作为合法通信的掩体,研究发现此时利用信道的不确定可以实现隐蔽无线通信㊂文献[17]进一步研究了信道不确定性和噪声不确定性对隐蔽通信系统性能的联合影响㊂值得注意的是,基于信道不确定性的隐蔽无线通信一定需要其它发射信号作为通信掩体,这样才能将信道的不确定性和随机性转化为敌方接收功率的不确定性㊂2.3㊀基于协助干扰基于协助干扰的隐蔽无线通信㊂在实际无线通信的场景中,将信号完全隐藏在背景噪声之中是比较困难的,而协助干扰可以提升环境噪声水平,如图3所示㊂随机变化的干扰发射功率可以增加Willie接收信号的不确定性,降低其正确检测概率㊂文献[18]最早研究了存在一个协助干扰节点Jammer时的隐蔽无线通信,分别分析了AWGN信道和瑞利块衰落信道下的Willie最优检测门限,并设计了一种基于随机编码的隐蔽通信方案,研究表明合理的协助干扰有利于提升正隐蔽容量㊂针对文献[18]中的干扰节点功率需要实时协作控制等不足,文献[19]进一步提出了Bob为全双工接收机时的隐蔽无线通信系统,此时Bob发射干扰功率的随机性可受接收机直接实时控制和设计,一定程度降低了系统复杂性,但缺点是Bob发射干扰的同时不可避免地会暴露其上行通信行为及位置㊂文献[20]引入了具有协助干扰能力的放大转发中继,分别将中继发射干扰功率的随机性以及信道的随机性作为隐蔽来源,为实现中远程距离隐蔽无线通信的方案设计提供了参考㊂图3㊀基于协作干扰的隐蔽无线通信模型现如今通信干扰器已遍布于在全球市场,发射频谱干扰更是频谱战的常规手段,因此有理由相信基于协助干扰的隐蔽方案有可能成为未来战场主流隐蔽无线通信方案㊂2.4㊀基于有限块长基于有限块长的隐蔽无线通信系统㊂在一些时延不容忍的隐蔽通信场景中,即信道使用次数N 有限,文献[18]最早研究了存在协助干扰节点时有限块长N对Willie检测性能的影响,文献[21]则证明了AWGN信道下信道使用次数n达到最大㊀第5期赵㊀华,等:隐蔽无线通信综述523㊀值N时最有利于系统达到最大隐蔽吞吐量,并在此基础上设计了连续和离散两种随机发射功率方案,通过仿真分析对比了两种方案下系统的隐蔽㊁可靠和总体性能,对实际有限块长的隐蔽无线通信系统设计具有一定指导意义㊂文献[22]进一步考虑了Willie配备多天线时对有限块长通信系统隐蔽性能的影响,研究发现Willie天线数量只要略微增加都会显著降低系统隐蔽吞吐量㊂目前该方向的研究相对较少,关于有限块长隐蔽无线通信系统在一些复杂环境下的隐蔽性能㊁与无限块长隐蔽通信方案的适配性等诸多问题仍有待进一步深入和探索㊂2.5㊀多节点隐蔽网络隐蔽无线通信研究的最终目标就是构建隐蔽网络[23]㊂如图4所示,该网络中包含随机分布的多个发送节点Alice㊁合法接收节点Bob以及非法检测节点Willie,还包含多个人工干扰节点Jammer 和中继节点Relay㊂文献[24]基于存在多个Willie 以及多个协助干扰节点Jammer的简单隐蔽网络模型,考虑距离Willie最近的干扰节点发送人工噪声,其中干扰节点服从二维泊松点分布㊂文献[25]考虑泊松分布的干扰节点共同产生散粒噪声,并研究了此时系统的隐蔽性㊁可靠性和总体性能㊂文献[26]进一步考虑了配备多天线发射机以应对多个Willie检测的情形,研究发现多天线技术能为隐蔽性能带来增益,但同时也提高了整个系统的复杂性和开销㊂图4㊀多节点隐蔽网络随着多节点隐蔽网络系统发展和研究的不断深入,如何模拟复杂环境并构建更贴近实际的多节点隐蔽网络㊁如何利用网络中其他发射节点的聚合干扰实现隐蔽性等一些问题仍有待进一步研究㊂3㊀隐蔽无线通信技术应用隐蔽无线通信作为一个新型研究方向已经不断迈向成熟,同时它作为一项防范检测攻击和恶意窃听的有效技术,具有良好的技术兼容性,并已经在多跳传输㊁导频攻击㊁D2D内容共享和无人机通信等一些特殊场景中得到研究和创新,展现了其巨大的发展潜力㊂基于中继的多跳隐蔽无线通信㊂虽然Alice 可以在多种设计方案下实现隐蔽通信,但核心思想都是隐藏一跳通信传输,针对端到端通信距离较大的场景,文献[27]设计了基于中继的多跳消息隐蔽传输方案,针对网络中各中继的具体路由策略,提出了最大吞吐量和最小端到端时延两种路由算法,对比了中继采用单个密钥以及采用独立多密钥两种方案的隐蔽吞吐量和时延㊂隐蔽导频攻击场景㊂文献[28]考虑了主动窃听场景下合法全双工窃听者试图检测可疑的多天线系统通信场景,提出了一种隐蔽导频欺骗攻击方案以提高合法窃听性能㊂研究证明,在信道估计过程中合法窃听者可以利用检测方对信道状态信息的不确定性来有效对抗可疑的多天线通信系统㊂基于设备到设备(Device to Device,D2D)内容共享场景下的隐蔽无线通信㊂文献[29]首次在D2D内容共享场景中构建了一种新的隐蔽无线通信模型,利用已有的共信道干扰作为隐蔽传输的掩体以混淆Willie的检测,在提出安全有效资源分配方案同时也基于匹配博弈的思想设计了相应算法,解决了功率控制过程中的频谱分配问题,为D2D 内容共享场景中建立隐蔽无线通信提供了有效指导㊂基于无人机系统的隐蔽无线通信㊂文献[30]研究了无人机对地面站的隐蔽通信方案,通过联合设计无人机飞行轨迹和传输功率以最大化无人机对地面站的隐蔽传输速率,首次将隐蔽无线通信的应用从静态场景扩展到动态场景㊂以上研究成果不难发现,隐蔽无线通信如今的潜在应用场景已经涉及移动通信㊁物联网等诸多方面,它的发展和成熟必将带来更为广阔的应用前景[31]㊂4㊀面临的挑战及潜在研究方向隐蔽无线通信是综合各项技术的巧妙运用,其524㊀信息工程大学学报㊀2020年㊀相关研究已经成为无线通信安全领域中的一支新秀㊂尽管近年来隐蔽无线通信研究已经有了较快进展,本文认为隐蔽无线通信研究仍存在以下挑战与潜在研究方向:①基于已有通信掩体的隐蔽无线通信方案设计㊂目前隐蔽无线通信方案所采用的掩体多为背景噪声和协作干扰,而利用已有通信作为掩体具有弱化隐蔽条件㊁降低系统复杂度等优势,因此可以进一步研究利用已有通信作为掩体的隐蔽无线通信系统㊂②对抗多类型㊁高性能非法检测方的隐蔽通信方案设计㊂目前隐蔽无线通信研究基本都是基于敌方处于被动静态检测的假设,然而一个可以动态调整检测位置的敌方用户会使目前诸多隐蔽通信方案的效果大打折扣㊂因此,如何设计能够有效对抗敌方调整检测位置的隐蔽方案是未来有待开展的研究之一㊂另外,从敌方采取连续变化点位检测的角度建立新型隐蔽无线通信框架并设计隐蔽方案也是一项充满挑战的工作[32]㊂③改进现有隐蔽无线通信评价体系㊂一方面,目前研究一般站在敌方角度考虑其最优检测性能,事实上由于敌方位置的不确定性㊁信道状态信息无法获取以及检测实时性要求等未知因素,合法方真正能获得的隐蔽性能仅依靠现有隐蔽概率指标还无法进行完整㊁准确地度量㊂另一方面,实际隐蔽通信系统真正关注的应是通信时无法被敌方检测的概率,现有基于虚警率和漏检率之和的隐蔽概率评价指标未必合理㊂因此,亟需站在合法方角度设计能够全面有效且多维度地评价系统隐蔽性的指标㊂5㊀结束语本文综述了近年来发展火热的隐蔽无线通信研究,首先介绍了隐蔽无线通信的基础理论研究,随后重点对其系统研究分5部分进行归纳和总结,详细阐述研究现状的同时指出仍待解决的研究问题㊂本文还介绍了目前隐蔽无线通信技术在多个场景中应用创新,并在最后对未来隐蔽无线通信值得关注的研究方向进行展望与讨论㊂参考文献:[1]YAN S,ZHOU X,HU J,et al.Low probability of de-tection communication:Opportunities and challenges [J].IEEE Wireless Communications,2019,26(5):19-25.[2]BASH B A,GOECKEL D,TOWSLEY D.Limits of reli-able communication with low probability of detection on AWGN channels[J].IEEE journal on selected areas in communications,2013,31(9):1921-1930. [3]CHE P,BAKSHI M,JAGGI S.Reliable deniable com-munication:Hiding messages in noise[C]//2013IEEE International Symposium on Information Theory.IEEE, 2013:2945-2949.[4]WANG L,WORNELL G W,ZHENG L.Fundamental Limits of Communication With Low Probability of Detec-tion[J].IEEE Transactions on Information Theory, 2016,62(6):3493-3503.[5]ARUMUGAM K S K,BLOCH M R.Keyless covert com-munication over multiple-access channels[C]//2016 IEEE International Symposium on Information Theory (ISIT).IEEE,2016:2229-2233.[6]ABDELAZIZ A,KOKSAL C E.Fundamental limits of covert communication over MIMO AWGN channel[C]// 2017IEEE Conference on Communications and Network Security(CNS).IEEE,2017:2106-2114. [7]SOLTANI R,GOECKEL D,TOWSLEY D,et al.Covert communications on poisson packet channels[C]//2015 53rd Annual Allerton Conference on Communication, Control,and Computing(Allerton).IEEE,2015:1046-1052.[8]SHEIKHOLESLAMI A,BASH B A,TOWSLEY D,et al.Covert Communication over Classical-Quantum Chan-nels[C]//2016IEEE International Symposium on Infor-mation Theory(ISIT).IEEE,2016:2064-2068. [9]YAN S,CONG Y,HANLY S V,et al.Gaussian signal-ling for covert communications[J].IEEE Transactions on Wireless Communications,2019,18(7):3542-3553.[10]TAHMASBI M,BLOCH M R.First-and Second-Order As-ymptotics in Covert Communication[J].IEEE Transactionson Information Theory,2018,65(4):2190-2212. [11]HOU J,KRAMER G.Effective secrecy:Reliability,confusion and stealth[C]//2014IEEE InternationalSymposium on Information Theory.IEEE,2014:601-605.[12]BLOCH M R.Covert communication over noisy chan-nels:A resolvability perspective[J].IEEE Transactionson Information Theory,2016,62(5):2334-2354.[13]LIN P,JANDA C R,JORSWIECK E A.Stealthy secretkey generation[C]//2017IEEE Global Conference onSignal and Information Processing(GlobalSIP).IEEE,2017:492-496.[14]LEE S,BAXLEY R J,WEITNAUER M A,et al.Achieving Undetectable Communication[J].IEEE Jour-㊀第5期赵㊀华,等:隐蔽无线通信综述525㊀nal of Selected Topics in Signal Processing,2015,9(7):1195-1205.[15]HE B,YAN S,ZHOU X,et al.On Covert Communi-cation with Noise Uncertainty[J].IEEE Communica-tions Letters,2016,21(4):941-944. [16]SHAHZAD K,ZHOU X,YAN S.Covert communica-tion in fading channels under channel uncertainty[C]//2017IEEE85th Vehicular Technology Conference(VTC Spring).IEEE,2017:312-316. [17]TA H Q,KIM S W.Covert Communication UnderChannel Uncertainty and Noise Uncertainty[C]//ICC2019-2019IEEE International Conference on Communi-cations(ICC).IEEE,2019:221-226. [18]SOBERS T V,BASH B A,GUHA S,et al.CovertCommunication in the Presence of an Uninformed Jam-mer[J].IEEE Transactions on Wireless Communica-tions,2017,16(9):6193-6206.[19]SHAHZAD K,ZHOU X,YAN S,et al.AchievingCovert Wireless Communications Using a Full-DuplexReceiver[J].IEEE Transactions on Wireless Communi-cations,2018,17(12):8517-8530.[20]WANG J,TANG W,ZHU Q,et al.Covert Communi-cation With the Help of Relay and Channel Uncertainty[J].IEEE Wireless Communications Letters,2018,8(1):317-320.[21]YAN S,HE B,ZHOU X,et al.Delay-intolerant covertcommunications with either fixed or random transmitpower[J].IEEE Transactions on Information Forensicsand Security,2018,14(1):129-140. [22]SHAHZAD K,ZHOU X,YAN S.Covert WirelessCommunication in Presence of a Multi-Antenna Adver-sary and Delay Constraints[J].IEEE Transactions onVehicular Technology,2019,68(12):12432-12436.[23]BASH B A,GOECKEL D,GUHA S,et al.Hiding In-formation in Noise:Fundamental Limits of CovertWireless Communication[J].Communications Maga-zine IEEE,2015,53(12):26-31.[24]SOLTANI R,GOECKEL D,TOWSLEY D,et al.Cov-ert wireless communication with artificial noise genera-tion[J].IEEE Transactions on Wireless Communica-tions,2018,17(11):7252-7267.[25]HE B,YAN S,ZHOU X,et al.Covert wireless com-munication with a Poisson field of interferers[J].IEEETransactions on Wireless Communications,2018,17(9):6005-6017.[26]ZHENG T X,WANG H M,Ng D W K,et al.Multi-antenna covert communications in random wireless net-works[J].IEEE Transactions on Wireless Communica-tions,2019,18(3):1974-1987.[27]SHEIKHOLESLAMI A,GHADERI M,TOWSLEY D,et al.Multi-Hop Routing in Covert Wireless Networks[J].IEEE Transactions on Wireless Communications,2018,17(6):3656-3669.[28]LU X,YANG W,CAI Y,et al.Proactive Eavesdrop-ping via Covert Pilot Spoofing Attack in Multi-AntennaSystems[J].IEEE Access,2019,7:151295-151306.[29]SHI X,WU D,YUE C,et al.Resource Allocation forCovert Communication in D2D Content Sharing:AMatching Game Approach[J].IEEE Access,2019,4:72835-72849.[30]ZHOU X,YAN S,HU J,et al.Joint Optimization of aUAV's Trajectory and Transmit Power for Covert Com-munications[J].IEEE Transactions on Signal Process-ing,2019,67(16):4276-4290.[31]LIU Z,LIU J,ZENG Y,et al.Covert Wireless Com-munications in IoT Systems:Hiding Information in In-terference[J].IEEE Wireless Communications,2018,25(6):46-52.[32]HUANG K W,WANG H M,Towsley D,et al.LPDCommunication:A Sequential Change-Point DetectionPerspective[J].IEEE Transactions on Communications,2020,68(4):2474-2490.(编辑:颜峻)。

北京邮电大学学报 2020年 第43卷 第1~6期 总目次

北京邮电大学学报 2020年 第43卷 第1~6期 总目次

北京邮电大学学报2020年第43卷第1 6期总目次综述从5G到6G的思考:需求、挑战与技术发展趋势易芝玲王森韩双锋崔春风王亚峰(2)1………………………………………………智简6G无线接入网:架构、技术和展望彭木根孙耀华王文博(3)1美俄电子战对抗的现状与分析陆震黄用华(5)1…………………………………………………………………………………智简无线网络赋能行业应用张平许晓东韩书君牛凯许文俊兰岳恒(6)1 6G愿景、业务及网络关键性能指标崔春风王森李可董静郑智民(6)10…………………………………面向生态可持续的下一代通信网络架构与评价体系吕廷杰宋罗娜滕颖蕾丰业媛(6)18论文…………………大规模3D MIMO中基于信道相关的LOS/NLOS识别算法李君瑶常永宇曾天一(1)1…………………………………………………基于链路预测的手机节能方法徐九韵孙忠顺张如如(1)8………………………兼顾路段和交叉口的路网脆弱性识别机制李永成刘树美于尧李爽(1)14……………基于信道模糊关联识别的NLOS测距误差补偿算法李晓辉杜洋帆石潇竹杨胥(1)21………………………………基于强化学习的微电网能源调度策略及优化刘金华柯钟鸣周文辉(1)28………………………高斯白噪声信道下SC-LDPC码的结构设计张亚坤张娅妹周林贺玉成(1)35……………………基于BP神经网络的CSI无源目标分类方法蒋芳张南飞胡艳军王翊(1)40………嵌入式固件脆弱哈希函数自动识别与破解方法张国栋应欢杨寿国石志强李霁远(1)46…………………………………基于马尔可夫链的人工蜂群算法郭佳马朝斌苗萌萌张绍博(1)54………………………………………全双工系统中基于神经网络的自干扰消除方案雷维嘉李环(1)61……………基于归一化特征判别的日志模板挖掘算法双锴李怡雯吕志恒韩静刘建伟(1)68………………基于狄利克雷分布的可信路由转发机制杜聪张喆李温静郭少勇孟洛明(1)74…………………………………基于本地内容流行度预测的主动缓存策略任佳智田辉聂高峰(1)80…………………………纠缠微波信号的量子仿真模型李响吴德伟朱浩男苗强魏天丽(1)92………………………基于博弈论的WiFi接入资源动态分配算法叶晓彤刘周斌邵苏杰亓峰(2)10…………电力SDN通信网中面向负载均衡的路由重构刘保菊喻鹏丰雷邱雪松江昊(2)16…………………基于Rete规则推理的告警关联性分析杨杨石晓丹宋双霍永华陈连栋(2)23基于平均场博弈的超密集网络边缘缓存和删除分配研究王孟哲滕颖蕾宋梅韩丹涛张勇(2)29…………………………………………………………………………………………一种鲁棒网络流量分类及新类型发现算法仇景明曲桦赵季红(2)402……………………基于时延和能耗的SD-DCN的路由优化算法姚赞王颖邱雪松文禹棋(2)46…………………一种频变传输线系统电磁脉冲响应的数值算法王川川贾锐曾勇虎汪连栋(2)52全双工能量受限中继网络的安全波束成形设计陈佩佩李陶深葛志辉方兴(2)59……………………………………………………物联网中基于iBeacon的防碰撞广播方案许凌毅韩道岐刘雯(2)66 SRS资源受限场景中联合导频分配的多用户分组曾天一常永宇李君瑶(2)74………………………………………………………………………低轨卫星网络动态路径切换技术王璇侯蓉晖徐伟琳(2)80……基于深度强化学习的综合能源业务通道优化机制马庆刘喻鹏吴佳慧熊翱颜拥(2)87基于Linux系统的LEO卫星动态路由协议研究与实现王程徐玭张素兵王力权王卫东(2)94………………………………………………………尘土颗粒影响下电路板电化学迁移失效寿命建模探索周怡琳杨璐鲁文睿(3)11……………………多载波认知无线电无线携能通信资源分配算法郭少雄刘玉涛吕玉静张中兆(3)19…………………………基于射频能量收集的无人机协助的分时段功率分配策略刘志超赵宜升高锦程陈忠辉(3)24缓存辅助边缘计算的卸载决策与资源优化薛建彬丁雪乾刘星星(3)32……………………………………………基于改进CNN的阀门泄漏超声信号识别方法宁方立韩鹏程段爽李航韦娟(3)38空间相关信道下大规模MIMO系统频谱效率分析丁青锋连义翀邓玉前(3)45……………………………………多用户MIMO-WET系统中短包传输的块错误概率分析赵伟骆亚菲鲍慧王斌(3)51………………………………时间反演多址系统中的一种多用户检测算法朱江梁静雯吕志强(3)59………………………卫星组网系统下的多普勒频移估计与补偿朱军李秋瑾李凯王华俊(3)66…………………稀疏移动网络中时延软约束的低能耗路由算法许蒙蒙朱海崔娅杰徐恒舟(3)72…………………………基于柔顺控制的机器人装配技术喻洋王耀兵魏世民马如奇唐玲(4)1…………………基于图形分割的城市地下车库车位排布优化方法黄逸彬杨赫周钟秉刘晓(4)7…………………………………………一种动态自纠正最小和LDPC码的译码算法陈容陈岚(4)15………………………面向移动通信网络覆盖的四元数域粒子群优化算法秦运慧皇甫伟隆克平(4)21不等长十字形谐振器双频带带通滤波器设计喇东升关鑫李钰莹李弘诚郭经纬(4)27…………基于改进3D-ESPRIT算法的三维GTD模型参数估计…………………………………………………………………郑舒予张小宽宗彬锋徐嘉华(4)32……………………………………一种面向定点轨迹数据的行程识别方法张宽赵卓峰郭炜强(4)39传感云中基于边缘计算的差分数据保护方法梅雅欣沈雪微赵丹王田(4)48……………………Nakagami-m信道衰落下的多时隙能量收集无线通信王明伟李慧贞(4)54…………………………………Massive-MIMO系统中能效和频效的性能折中方法李民政丁健刘宁王浩(4)61………………………基于时序相关性的云平台多负载序列联合预测张志华王梦情毛文涛刘春红程渤(4)68……基于CNN-ResNet-LSTM模型的城市短时交通流量预测算法蒲悦逸王文涵朱强陈朋朋(5)9移动边缘计算中基于能量收集的能效优化方案薛建彬刘星星丁雪乾(5)15……………………………半监督聚类目标下粒子群算法的分析与改进孙艺夏启钊(5)21……………………………………………………………………面向多模态数据的混合型FIB王彬志李卓罗蓬马天祥刘开华(5)27…………………基于改进遗传算法的移动机械臂拣选路径优化王怀江刘晓平王刚韩松(5)34……………………………多站雷达干扰对抗系统子站选择策略聂曌刘洁怡张明阳李豪(5)41基于前向学习网络的人脸欺诈检测宋昱孙文赟陈昌盛(5)48…………………………………………基于博弈的机坪感知网络机会传输控制方法陈维兴苏景芳赵卉(5)57………………………………一种利用随机森林方法检测睡眠呼吸暂停的研究吕兴凤李金宝(5)64……………………………………基于高速多核网络的远监督关系抽取方法李威陈曙东欧阳小叶杜蓉王荣(5)71…………一种用于图卷积网络的社交关系方向门控算法李蕾谢旸蒋亚飞刘咏彬(5)77…………………基于数据增强的中文医疗命名实体识别王蓬辉李明正李思(5)84……………………………………基于视频数据特性的动态手势识别谢晓燕赵欢蒋林(5)91…………………………………………一种基于高层特征融合的网络商品分类刘逸琛孙华志马春梅姜丽芬钟长鸿(5)98………………一种基于CSI 的人体动作计数与识别方法刘希文陈海明(5)105……………………………………………OAM-MIMO 通信系统的信道容量研究唐杰李凯林楚婷宋彦周恩丞(6)27…………………基于SiGe 工艺的28GHz 变压器匹配差分Cascode 功率放大器张尧祯刘昱(6)36……………………无人机应急通信网络中的动态资源分配算法王子端张天魁许文俊杨立伟(6)42……………………IRS 辅助的边缘智能系统中基于数据重要性感知的资源分配田辉倪万里王雯郑景桁贺硕(6)51………………………………………………………基于信道测量的短距离太赫兹信道特性分析田浩宇唐盼田磊张建华何敬锁(6)59…………面向6G 边缘网络的云边协同计算任务调度算法马璐刘铭李超路兆铭马欢(6)66……无人机网络的覆盖及切换性能研究焦铭晗彭木根刘晨熙(6)74…………………………………………全双工小蜂窝中基于最大流算法的用户匹配策略赵飞飞周墨淼胡树楷杨涛(6)82………………雾计算中用户和属性可撤销的访问控制王峥李玲李娜(6)88……………………………………基于KM 算法的分布式无线节点任务分配方法田兴鹏朱晓荣朱洪波(6)96……………………………多天线无人机通信系统中的安全波束成形方案汪萧萧淡振雷顾晨伟朱卫平林敏(6)103………研究报告一种面向软件定义网络的大流检测机制邢长友李东阳谢升旭张国敏魏伟(1)97………………一种车载网隐私保护方案的分析与改进李涛张静杨皓(1)104……………………………………PDMA 的可见光通信系统申晓欢林邦姜汤璇许俊翔(1)111…………………………………………非平稳噪声下稀疏表示的DOA 估计算法韦娟曹凯军宁方立(1)116…………………………………社交网络用户身份关联及其分析孙波张伟司成祥(1)122……………………………………………基于卷积神经网络的彩色铅笔画算法王小玉胡鑫豪韩昌林(1)129………………………………………基于相似轨迹替代查询的位置隐私保护方案研究宋成张亚东彭维平王磊刘志中(1)135……一种面向边缘计算的混合内存系统孙浩陈岚郝晓冉刘晨吉倪茂(2)103……………………移动边缘计算中的时延和能耗均衡优化算法景泽伟杨清海秦猛(2)110………………………………Spark 环境下基于数据倾斜模型的Shuffle 分区优化方案阎逸飞王智立邱雪松王嘉潞(2)116………基于无线通信组网的DPFC 系统控制策略陈汹封科钟亮民赵静波朱开阳(2)122……………一种基于ResNet 网络特征的视觉目标跟踪算法马素刚赵祥模侯志强王忠民孙韩林(2)129……绿色车辆路径问题研究孔继利陈璨(3)77…………………………………………………………………无人机辅助5G 网络中基于合同的缓存租赁机制王敏张碧玲(3)83 (3)基于U-Net 的颅内出血识别算法张天麒康波孟祥飞刘奕琳周颖(3)92………………………基于MBM 的未编码空时标记分集技术金宁宋伟婧金小萍陈东晓王嘉天(3)99………………能量采集衬底式认知协作中继网络安全中断概率分析罗轶王雨婷施荣华严梦纯曾豪(3)105………………………………………………………基于主成分分析与迭代最近点的三维膝关节配准王小玉陈琳(3)112……………………………………一种海量数据快速聚类算法何倩李双富黄焕徐红(3)118………………………………………压缩感知安全理论研究汤永利赵明洁李丽香(3)125………………………………………………………基于改进萤火虫优化神经网络的WSNs 分簇路由协议戴剑勇邓先红王彬汪恒浩(3)131…………多用户无线供电通信网络中基于最大加权和速率的优化方案李方伟吴玥(3)138………………………一种基于PPI 网络的乳腺癌差异基因分析算法王小玉冯阳(4)76………………………………………一种基于对偶Regev 加密的门限公钥加密方案李增鹏王九如张问银马春光(4)83…………………基于FPGA 的高精度时间数字转换电路设计戴庆达叶茂(4)88…………………………………………一种基于Shapelet 算法的指纹定位方法常紫英王文涵李涛刘芬陈朋朋(4)95………………一种面向边缘计算节点能量优化的QoS 约束路由算法张德干陈露陈晨张婷崔玉亚(4)101………………………………………………………基于罚函数与水波优化的WSN 定位算法余修武张可刘永(4)106…………………………………基于度约束最小生成树的域间路由恢复算法王禹张连成张宏涛郭毅(4)113……………………基于正交索引调制多址接入的检测和性能分析金小萍吴青金宁陈东晓王嘉天(4)120………一种基于EEMD 的异常声音识别方法韦娟顾兴权宁方立(5)112……………………………………基于深度学习的类SM4算法S 盒逆向分析马向亮李冰杨丹黄克振段晓毅(5)118…………基于映射曲线的自适应莱维鲸鱼无线定位算法余修武李莹刘永肖人榕余昊(5)125………多小区下行NOMA 系统中最大公平的功率分配方案田心记蒋清丽(5)130………………………………基于密度聚类的容迟网络路由协议温卫(5)137………………………………………………………………低空小目标检测中的单通道干扰信号重构和抑制算法石潇竹杜洋帆李晓辉方聪(5)143…………基于协作的大规模NGSO 星座间频率兼容共存研究李伟潘冀严康魏文康张磊(6)110……基于改进双层LT 码的天基物联网数据收集方法何建华赵辉徐晓斌闫蕾王尚广(6)118……基于mMIMO 的MEC 安全节能资源分配方法赵伟王斌鲍慧赵品芳李保罡(6)126………基于DRL 的6G 多租户网络切片智能资源分配算法管婉青张海君路兆铭(6)132……………………无线网络中区块链共识算法的开销分析曹傧聂凯君彭木根周治中张磊(6)140 (4)JOURNAL OF BEIJING UNIVERSITY OFPOSTS AND TELECOMMUNICATIONSVol.43No.1 62020CONTENTSREVIEWFrom5G to6G:Requirements,Challenges and Technical TrendsYI Zhi-ling WANG Sen HAN Shuang-feng CUI Chun-feng WANG Ya-feng(2)1…………………………………………Intelligent-ConciseRadio Access Networks in6G:Architecture,Techniques and InsightPENG Mu-gen SUN Yao-hua WANG Wen-bo(3)1……………………………………………………………………………Electronic Warfare Confrontation between the United States andRussia LU Zhen HUANG Yong-hua(5)1…………………………EntropyReduced Mobile Networks Empowering Industrial ApplicationsZHANG Ping XU Xiao-dong HAN Shu-jun NIU Kai XU Wen-jun LAN Yue-heng(6)1………………………………6G Vision,Scenarios and NetworkRequirements CUI Chun-feng WANG Sen LI Ke DONG Jing ZHENG Zhi-min(6)10……The Architecture Design and Evaluation Method for Next Generation of Eco-Sustainable Communication NetworksL Ting-jie SONG Luo-na TENG Ying-lei FENG Ye-yuan(6)18…………………………………………………………PAPERSChannel Correlation Based LOS/NLOS Identification for3D Massive MIMO SystemsLI Jun-yao CHANG Yong-yu ZENG Tian-yi(1)1……………………………………………………………………………Mobile Phone Energy Saving Based on Link Prediction XU Jiu-yun SUN Zhong-shun ZHANGRu-ru(1)8………………………Road Network Vulnerability Identification Considering the Impact ofRoad Sections and Intersections CongestionLI Yong-cheng LIU Shu-mei YU Yao LI Shuang(1)14……………………………………………………………………NLOSRanging Error Compensation Algorithm Based on Fuzzy Association Channel IdentificationLI Xiao-hui DU Yang-fan SHI Xiao-zhu YANG Xu(1)21…………………………………………………………………Reinforcement Learning Based Energy Dispatch Strategy and Control Optimization of MicrogridLIU Jin-hua KE Zhong-ming ZHOU Wen-hui(1)28…………………………………………………………………………Structure Design of SC-LDPC Code over Additive White Gaussian Noise ChannelZHANG Ya-kun ZHANG Ya-mei ZHOU Lin HE Yu-cheng(1)35…………………………………………………………BP Neural Network Based CSI Device-Free Target Classification MethodJIANG Fang ZHANG Nan-fei HU Yan-jun WANG Yi(1)40………………………………………………………………Automatic Identification and Cracking Method for Vulnerable Hash Functions of Embedded FirmwaresZHANG Guo-dong YING Huan YANG Shou-guo SHI Zhi-qiang LI Ji-yuan(1)46………………………………………Markov Chain Based Artificial Bee Colony Algorithm GUO Jia MA Chao-bin MIAO Meng-meng ZHANG Shao-bo(1)54………Signal Combining and Self-Interference Cancellation Scheme Based on Linear Neural Network in a Full-DuplexReceiver Cooperative Jamming System LEI Wei-jia LI Huan(1)61………………………………………………………………………6Log Template Extraction Algorithm Based on Normalized Feature DiscriminationSHUANG Kai LI Yi-wen L Zhi-heng HAN Jing LIU Jian-wei(1)68……………………………………………………TrustedRouting and Forwarding Mechanism Based on Dirichlet DistributionDU Cong ZHANG Zhe LI Wen-jing GUO Shao-yong MENG Luo-ming(1)74……………………………………………Proactive Caching Scheme with Local Content Popularity PredictionREN Jia-zhi TIAN Hui NIE Gao-feng(1)80………………Quantum Simulation Model of Entangled Microwave SignalsLI Xiang WU De-wei ZHU Hao-nan MIAO Qiang WEI Tian-li(1)92……………………………………………………Dynamic Allocation Algorithm of WiFi AccessResources Based on the Game TheoryYE Xiao-tong LIU Zhou-bin SHAO Su-jie QI Feng(2)10…………………………………………………………………Rerouting Algorithm for Load Balancing in SDN-Enabled Smart Grid Communication NetworkLIU Bao-ju YU Peng FENG Lei QIU Xue-song JIANG Hao(2)16………………………………………………………Alarm Correlation Analysis Based onReteRuleReasoningYANG Yang SHI Xiao-dan SONG Shuang HUO Yong-hua CHEN Lian-dong(2)23………………………………………Mean-Field Game Based Edge Caching and Deleting Allocation in Ultra-Dense NetworksWANG Meng-zhe TENG Ying-lei SONG Mei HAN Dan-tao ZHANG Yong(2)29………………………………………ARobust Network Traffic Classification and New Type Discovery Algorithm QIU Jing-ming QU Hua ZHAO Ji-hong(2)40……Deadline-Aware and Energy EfficientRouting Optimization Algorithm in SD-DCNYAO Zan WANG Ying QIU Xue-song WEN Yu-qi(2)46…………………………………………………………………A Numerical Algorithm for the TransientResponse of a Frequency-Dependent Transmission Line System Excited by EMPWANG Chuan-chuan JIARui ZENG Yong-hu WANG Lian-dong(2)52……………………………………………………Secure Beamforming Design for Full-Duplex Energy-ConstrainedRelaying NetworksCHEN Pei-pei LI Tao-shen GE Zhi-hui FANG Xing(2)59…………………………………………………………………Anti-Collision Broadcasting Scheme Based on iBeacon in Internet of Things XU Ling-yi HAN Dao-qi LIU Wen(2)66…………Joint Pilot Allocation and User Grouping Scheme with Limited SRSResources ZENG Tian-yi CHANG Yong-yu LI Jun-yao(2)74……Dynamic Path Switching Technology for LEO Satellite Networks WANG Xuan HOURong-hui XU Wei-lin(2)80………………A Integrated Energy Service Channel Optimization Mechanism Based on DeepReinforcement LearningMA Qing-liu YU Peng WU Jia-hui XIONG Ao YAN Yong(2)87…………………………………………………………Research and Implementation of DynamicRouting Protocol for LEO Satellites Based on Linux SystemWANG Cheng XU Pin ZHANG Su-bing WANG Li-quan WANG Wei-dong(2)94………………………………………Exploring the Life Modeling Methods for Electrochemical Migration Failure of Printed Circuit Board under Dust ParticlesZHOU Yi-lin YANG Lu LU Wen-rui(3)11……………………………………………………………………………………Resource Allocation Algorithm for Simultaneous Wireless Information and Power Transfer in Multi-Carrier CognitiveRadioGUO Shao-xiong LIU Yu-tao L Yu-jing ZHANG Zhong-zhao(3)19………………………………………………………UAV-Assisted Time Division Power Allocation Strategy Based onRF Energy HarvestingLIU Zhi-chao ZHAO Yi-sheng GAO Jin-cheng CHEN Zhong-hui(3)24……………………………………………………Offloading Decision andResource Optimization for Cache-Assisted Edge ComputingXUE Jian-bin DING Xue-qian LIU Xing-xing(3)32…………………………………………………………………………Research on Identification Method of Valve Leakage Ultrasonic Signal Based on Improved CNNNING Fang-li HAN Peng-cheng DUAN Shuang LI Hang WEI Juan(3)38………………………………………………7Spectral Efficiency Analysis of Massive MIMO Systems over Spatial Correlation ChannelDING Qing-feng LIAN Yi-chong DENG Yu-qian(3)45………………………………………………………………………Packet Error Probability Analysis of Multiuser MIMO-WET System with Short-Packet TransmissionZHAO Wei LUO Ya-fei BAO Hui WANG Bin(3)51………………………………………………………………………A Multiuser Interference Cancellation Algorithm in TimeReversal Division Multiple Access SystemZHU Jiang LIANG Jing-wen L Zhi-qiang(3)59……………………………………………………………………………Doppler Shift Estimation and Compensation under Satellite Networking SystemZHU Jun LI Qiu-jin LI Kai WANG Hua-jun(3)66…………………………………………………………………………Energy-EfficientRouting with Delay Soft-Constraint in Sparse Mobile NetworksXU Meng-meng ZHU Hai CUI Ya-jie XU Heng-zhou(3)72………………………………………………………………Robot Assembly Technology Based on Compliance YU Yang WANG Yao-bing WEI Shi-min MARu-qi TANG Ling(4)1……An Optimization Method for Urban Underground Parking Lots Allocation Based on Polygon DecompositionHUANG Yi-bin YANG He ZHOU Zhong-bing LIU Xiao(4)7………………………………………………………………A Dynamic Self-Corrected Minimum Sum Decoding Algorithm for LDPC Codes CHENRong CHEN Lan(4)15……………………Quaternion-Based Particle Swarm Optimization Algorithms for Mobile Communication Network CoverageQIN Yun-hui HUANGFU Wei LONG Ke-ping(4)21…………………………………………………………………………Design of Dual-Band Band-Pass Filter Based on Unequal Length CrossResonatorLA Dong-sheng GUAN Xin LI Yu-ying LI Hong-cheng GUO Jing-wei(4)27……………………………………………Parameter Estimation of the3D-GTD Model Based on a Modified3D-ESPRIT AlgorithmZHENG Shu-yu ZHANG Xiao-kuan ZONG Bin-feng XU Jia-hua(4)32……………………………………………………TravelRecognition Method for Fixed-Point Trajectory Data ZHANG Kuan ZHAO Zhuo-feng GUO Wei-qiang(4)39……………An Edge-Based Differential Method for Data Protection in Sensor-CloudMEI Ya-xin SHEN Xue-wei ZHAO Dan WANG Tian(4)48………………………………………………………………Multi-Slot Energy Harvesting Wireless Communication over Nakagami-m Channel FadingWANG Ming-wei LI Hui-zhen(4)54……………………………………………………………………………………………Performance Trade-off Method for Energy Efficiency and Spectral Efficiency in Massive-MIMO SystemLI Min-zheng DING Jian LIU Ning WANG Hao(4)61………………………………………………………………………Joint Prediction of Multi-Workload Sequences Based on Temporal Correlation in the CloudZHANG Zhi-hua WANG Meng-qing MAO Wen-tao LIU Chun-hong CHENG Bo(4)68…………………………………Urban Short-Term Traffic Flow Prediction Algorithm Based on CNN-ResNet-LSTM ModelPU Yue-yi WANG Wen-han ZHU Qiang CHEN Peng-peng(5)9……………………………………………………………Energy Efficiency Optimization Scheme Based on Energy Harvesting in Mobile Edge ComputingXUE Jian-bin LIU Xing-xing DING Xue-qian(5)15…………………………………………………………………………Analysis and Improvement of Semi-Supervised K-means Clustering Based on Particle Swarm Optimization AlgorithmSUN Yi XIA Qi-zhao(5)21……………………………………………………………………………………………………A Hybrid Forwarding Information Base for Multi-Modal DataWANG Bin-zhi LI Zhuo LUO Peng MA Tian-xiang LIU Kai-hua(5)27…………………………………………………Optimization of Mobile Manipulator Sorting Path Based on Improved Genetic AlgorithmWANG Huai-jiang LIU Xiao-ping WANG Gang HAN Song(5)34…………………………………………………………8A Subset Selection Strategy on Multiple-Radar Anti-Jamming Systems NIE Zhao LIU Jie-yi ZHANG Ming-yang LI Hao(5)41……Few-Shot Face Spoofing Detection Using Feedforward Learning Network SONG Yu SUN Wen-yun CHEN Chang-sheng(5)48…Opportunistic Transmission Control Method for Apron Sensing Network Based on Game TheoryCHEN Wei-xing SU Jing-fang ZHAO Hui(5)57………………………………………………………………………………A Method of Detecting Sleep Apnea UsingRandom Forest L Xing-feng,LI Jin-bao(5)64………………………………………Distant SupervisionRelation Extraction Method Based on Highway Multi-Kernel NetworkLI Wei CHEN Shu-dong OUYANG Xiao-ye DURong WANGRong(5)71………………………………………………A SocialRelationship Direction Gating Algorithm for Graph Convolutional NetworksLI Lei XIE Yang JIANG Ya-fei LIU Yong-bin(5)77………………………………………………………………………Data Augmentation for Chinese Clinical Named EntityRecognition WANG Peng-hui LI Ming-zheng LI Si(5)84…………………Dynamic GestureRecognition Based on Characteristics of Encoded Video Data XIE Xiao-yan ZHAO Huan JIANG Lin(5)91…Commodity Classification of Online Based on High-Level Feature FusionLIU Yi-chen SUN Hua-zhi MA Chun-mei JIANG Li-fen ZHONG Chang-hong(5)98……………………………………A Human Action Counting andRecognition Method Based on CSI LIU Xi-wen CHEN Hai-ming(5)105…………………………TheResearch on Channel Capacity of OAM-MIMO SystemTANG Jie LI Kai LIN Chu-ting SONG Yan ZHOU En-cheng(6)27………………………………………………………A28GHz Transformer Matched Differential Cascode Power Amplifier Based on SiGe TechnologyZHANG Yao-zhen LIU Yu(6)36………………………………………………………………………………………………Dynamic Caching Placement andResource Allocation in UAV Emergency Communication NetworksWANG Zi-duan ZHANG Tian-kui XU Wen-jun YANG Li-wei(6)42………………………………………………………Data-Importance-AwareResource Allocation in IRS-Aided Edge Intelligent SystemTIAN Hui NI Wan-li WANG Wen ZHENG Jing-heng HE Shuo(6)51……………………………………………………Analysis of Short-Distance Terahertz Channel Characteristics Based on Channel MeasurementsTIAN Hao-yu TANG Pan TIAN Lei ZHANG Jian-hua HE Jing-suo(6)59………………………………………………A Cloud-Edge Collaborative Computing Task Scheduling Algorithm for6G Edge NetworksMA Lu LIU Ming LI Chao LU Zhao-ming MA Huan(6)66………………………………………………………………Research on Coverage and Handover Performance of Unmanned Aerial Vehicle NetworkJIAO Ming-han PENG Mu-gen LIU Chen-xi(6)74……………………………………………………………………………User Matching with Maximum Flow Algorithm for Full-Duplex Small CellsZHAO Fei-fei ZHOU Mo-miao HU Shu-kai YANG Tao(6)82………………………………………………………………Access Control Scheme Supporting Userand AttributeRevocation in Fog Computing WANG Zheng LI Ling LI Na(6)88………Distributed Wireless Node Task Allocation Method Based on KM AlgorithmTIAN Xing-peng ZHU Xiao-rong ZHU Hong-bo(6)96………………………………………………………………………Secure Beamforming Scheme for Multi-Antenna UAV Communication SystemsWANG Xiao-xiao DAN Zhen-lei GU Chen-wei ZHU Wei-ping LIN Min(6)103…………………………………………REPORTSA Heavy Hitter Detection Mechanism in Software Defined NetworksXING Chang-you LI Dong-yang XIE Sheng-xu ZHANG Guo-min WEI Wei(1)97………………………………………9 Analysis and Improvement of Privacy Protection Scheme in VANET LI Tao ZHANG Jing YANG Hao(1)104……………………Study on PDMA Based Visible Light Communication SystemsSHEN Xiao-huan LIN Bang-jiang TANG Xuan XU Jun-xiang(1)111………………………………………………………DOA Estimation Algorithm for SparseRepresentation Under Non-Stationary Noise WEI Juan CAO Kai-jun NING Fang-li(1)116……Social Network User Identity Association and Its Analysis SUN Bo ZHANG Wei SI Cheng-xiang(1)122…………………………Color Pencil Drawing Based on Convolutional Neural Network WANG Xiao-yu HU Xin-hao HAN Chang-lin(1)129……………Research on Location Privacy Protection Scheme Based on Similar TrajectoryReplacementSONG Cheng ZHANG Ya-dong PENG Wei-ping WANG Lei LIU Zhi-zhong(1)135……………………………………A Hybrid Memory System for Edge Computing SUN Hao CHEN Lan HAO Xiao-ran LIU Chen-ji NI Mao(2)103……………A Delay and Energy Tradeoff Optimization Algorithm for Task Offloading in Mobile-Edge Computing NetworksJING Ze-wei YANG Qing-hai QIN Meng(2)110………………………………………………………………………………A Shuffle Partition Optimization Scheme Based on Data Skew Model in SparkYAN Yi-fei WANG Zhi-li QIU Xue-song WANG Jia-lu(2)116……………………………………………………………Control Strategy of DPFC System Based on Wireless Communication NetworkCHEN Xiong FENG Ke ZHONG Liang-min ZHAO Jing-bo ZHU Kai-yang(2)122………………………………………A Visual Object Tracking Algorithm Based on Features Extracted by DeepResidual NetworkMA Su-gang ZHAO Xiang-mo HOU Zhi-qiang WANG Zhong-min SUN Han-lin(2)129…………………………………ResearchReview of Green VehicleRouting Problem KONG Ji-li CHEN Can(3)77…………………………………………………Contract-Based CacheRenting Mechanism in UAV-Assisted5G Networks WANG Min ZHANG Bi-ling(3)83……………………U-Net Based Intracranial HemorrhageRecognitionZHANG Tian-qi KANG Bo MENG Xiang-fei LIU Yi-lin ZHOU Ying(3)92………………………………………………Uncoded Space-Time Labeling Diversity Based on MBMJIN Ning SONG Wei-jing JIN Xiao-ping CHEN Dong-xiao WANG Jia-tian(3)99………………………………………Secrecy Outage Probability Analysis of Underlay Cognitive CooperativeRelay Network with Energy HarvestingLUO Yi WANG Yu-ting SHIRong-hua YAN Meng-chun ZENG Hao(3)105……………………………………………Three-Dimensional Knee JointRegistration Based on Principal Component Analysis and Iterative Closest PointWANG Xiao-yu CHEN Lin(3)112………………………………………………………………………………………………A Fast Clustering Algorithm for Massive Data HE Qian LI Shuang-fu HUANG Huan XU Hong(3)118…………………………Research on Compressed Sensing Security Theory TANG Yong-li ZHAO Ming-jie LI Li-xiang(3)125……………………………ClusteringRouting Protocol for WSNs Based on Neural Network Optimization by Improved Firefly AlgorithmDAI Jian-yong DENG Xian-hong WANG Bin WANG Heng-hao(3)131……………………………………………………An Optimization Scheme with Weighted Sum-Rate Maximization for Multi-User Wireless Powered Communication NetworksLI Fang-wei WU Yue(3)138……………………………………………………………………………………………………An Algorithm for Differential Gene Analysis of Breast Cancer Based on PPI Network WANG Xiao-yu FENG Yang(4)76…………A Threshold Public Key Encryption via DualRegev SchemeLI Zeng-peng WANG Jiu-ru ZHANG Wen-yin MA Chun-guang(4)83……………………………………………………Design of Double-Chain Three-Route Time-to-Digital Converter Based on FPGA DAI Qing-da YE Mao(4)88……………………A Fingerprint Localization Method Based on Shapelet AlgorithmCHANG Zi-ying WANG Wen-han LI Tao LIU Fen CHEN Peng-peng(4)95……………………………………………A New Algorithm of QoS Constrained Routing for Node Energy Optimization of Edge ComputingZHANG De-gan CHEN LuCHEN ChenZHANG TingCUI Yu-ya (4)101………………………………………………Localization Algorithm Based on Penalty Function and Water Wave Optimization for WSNYU Xiu-wu ZHANG KeLIU Yong (4)106……………………………………………………………………………………A Failure Recovery Algorithm for Inter-Domain Routing System Based on Degree-Constrained Minimum Spanning TreeWANG YuZHANG Lian-chengZHANG Hong-taoGUO Yi (4)113………………………………………………………Detection and Performance Analysis Based on Quadrature Index Modulation Multiple AccessJIN Xiao-ping WU QingJIN NingCHEN Dong-xiaoWANG Jia-tian (4)120……………………………………………An Abnormal Sound Recognition Method Based on EEMD WEI Juan GU Xing-quanNING Fang-li (5)112………………………Reverse-Analysis of S-Box for SM4-Like Algorithms Based on Side Channel TechnologyMA Xiang-liang LI BingYANG DanHUANG Ke-zhen DUAN Xiao-yi (5)118……………………………………………Wireless Localization Algorithm of Adaptive Levy Whale Based on Mapping CurveYU Xiu-wu LI YingLIU YongXIAO Ren-rongYU Hao (5)125…………………………………………………………Maximum Fairness Power Allocation Scheme in Downlink Multi-Cell NOMA Systems TIAN Xin-ji JIANG Qing-li (5)130…………Routing Algorithm Based on Density Clustering for Delay Tolerant Network WEN Wei (5)137………………………………………Single Channel Interference Signal Reconstruction and Suppression Algorithm in Low Altitude Small Target DetectionSHI Xiao-zhu DU Yang-fanLI Xiao-huiFANG Cong (5)143………………………………………………………………Research on Frequency Compatibility of Collaboration-Based Large-Scale NGSO ConstellationsLI WeiPAN JiYAN KangWEI Wen-kangZHANG Lei (6)110…………………………………………………………Data Collection Method of Space-Based Internet of Things Based on Improved Double Level Distributed LT CodeHE Jian-hua ZHAO HuiXU Xiao-binYAN LeiWANG Shang-guang (6)118……………………………………………Energy Efficient Resource Allocation for Secure MEC System Based on mMIMOZHAO WeiWANG BinBAO HuiZHAO Pin-fangLI Bao-gang (6)126…………………………………………………Intelligent Resource Allocation Algorithm for 6G Multi-Tenant Network Slicing Based on Deep Reinforcement LearningGUAN Wan-qing ZHANG Hai-junLU Zhao-ming (6)132……………………………………………………………………Overhead Analysis of Blockchain Consensus Algorithm in Wireless NetworksCAO Bin NIE Kai-jun PENG Mu-gen ZHOU Zhi-zhong ZHANG Lei (6)140 01。

基于BATMAN-adv的多跳无线网络

基于BATMAN-adv的多跳无线网络

第19卷 第3期太赫兹科学与电子信息学报Vo1.19,No.3 2021年6月 Journal of Terahertz Science and Electronic Information Technology Jun.,2021文章编号:2095-4980(2021)03-0433-05基于BATMAN-adv的多跳无线网络赵志豪1,陈娅冰1,张戬 2(1.烟台工程职业技术学院信息与传媒系,山东烟台 264006;2.哈尔滨工业大学计算机科学与技术学院,黑龙江哈尔滨 150001)摘 要:无线自组网具有去中心化、多信道、多跳等特点,适用于专网和临时应急网络的快速搭建。

为了使网络具有更宽的覆盖、更强的绕射能力和更高的吞吐量,系统选择一种支持IEEE802.11 ac的三射频接口物理层节点,在此基础上,结合BATMAN-adv路由协议进行研究,实现了一种基于多接口多信道的自组网系统。

仿真实验数据表明,该系统在5G频谱中能够全双工使用正交信道降低干扰,将网络链路拓展至5跳以上,网络损耗衰减低于30%,网络吞吐量高于300Mbps。

关键词:自组网;多信道;正交信道;吞吐量中图分类号:TN915.03 文献标志码:A doi:10.11805/TKYDA2019571Multi-hop wireless network research based on BATMAN-advZHAO Zhihao1,CHEN Yabing1,ZHANG Jian2(rmation and Media Department, Yantai Engineering & Technology College, Yantai Shandong 264006, China;2.College of ComputerScience and Technology, Harbin Institute of Technology, Harbin Heilongjiang 150001, China)Abstract:Self-organized wireless network, featured by non-centralized, multi-channel, multi-hop, meets the requirements of emergence networks and dedicated networks. To gain the network performancewith longer range cover, non-visible communication and higher throughput, tri-radio nodes supportingIEEE802.11 ac protocol are selected. Combining with Better Approach To Ad-hoc NetworkAdvanced(BATMAN-adv) routing protocol, a system of self-organized wireless network with multi-channeland multi-interface is realized. The field test data indicates that the system extends coverage to 5 hops with30%throughput loss and the throughput is up to 300Mbps with orthogonal channels under full duplexmode in 5G spectrum.Keywords:self-organized;multi-channel;orthogonal channels;throughput无线网状网络(Wireless Mesh Network,WMN)[1]是一种区别于传统无线网络的新型通信网络。

CTC08录用论文清单:

CTC08录用论文清单:

CTC08录用论文清单:95 Regular papers + 40 Post-papers1. 会议报告论文 (Regular papers)ID Author Title Organization Topic 2郭建, 韩俊刚基于PSL的FIFO的验证西安电子科技大学设计验证5侯学彦 A Novel Low Power BIST for Scan Based Circuits Department of Microelctronics of Xi’anJiao Tong University数字测试12曾彬,张大方,黎文伟,谢高岗WPathload:一种改进的可用带宽测量方法研究湖南大学计算机与通信学院,湖南长沙410082容错技术14田力,金敏一种提高多存储单元内建自测试效率的电路设计英飞凌科技西安有限公司数字测试15白晓,余梅生一种对Pedersen的可验证秘密共享的改进方案燕山大学信息科学与工程学院容错技术16张玉怀,张玉兴电子产品的EMI控制策略论述电子科技大学电子工程学院AMS测试17田文杰,刘继承,艾兰基于蚁群神经网络的设备故障诊断北京联合大学自动化学院容错技术18邵晶波,马光胜,杨志,张瑞雪基于进程代数的SoC测试调度哈尔滨工程大学计算机科学与技术学院数字测试20姜岩峰,张晓波,黄绍起数字电视信道解调解码芯片内嵌式模数转换器的验证测试北方工业大学微电子中心AMS测试21骆昊,曾华燊分布式多点并发测试系统的设计与实现西南交通大学信息科学与技术学院软件测试24程伟,崔小乐基于蚁群算法的SoC测试壳和测试访问机制联合优化北京大学深圳研究生院集成微系统科学工程与应用重点实验室数字测试32薛彦红,吴金,张亮具有二次特性的斜坡补偿电路的设计东南大学集成电路学院南京 210096AMS测试33田俊峰,陈小祥,刘涛一种基于半环理论的可信性评估模型河北大学数学与计算机学院河北保定071002容错技术36柳永坡,刘雪梅,张懋测试流程管理与监控技术的研究与实现北京航空航天大学计算机学院,北京100083软件测试37骆祖莹电热分析及其对测试的影响北京师范大学信息科学与技术学院,北京100875数字测试38Song Yan-yan Zuo De-cheng YangXiao-zong Cui GangFault Tolerant Routing Protocol in WirelessSensor NetworksSchool of Computer Science andTechnology, Harbin Institute ofTechnology, Hei Long Jiang, Harbin150001容错技术39HU Mei (胡梅), WANG Hong (王红), YANG Shiyuan (杨士元) , CHENZhenmao (陈正茂)Linear Relativity among Node-Voltage Incrementsand Its Application in Soft Fault Diagnosis ofAnalog CircuitsDepartment of Automation, TsinghuaUniversity, Beijing 100084, ChinaAMS测试40裴慧卿,张秋实*,宋超,余瑛,高金山基于MSP430的手持式LCR数字电桥的设计与实现北京交通大学 100044 北京ATE应用41赵会群,赵洁,王恩雷基于TTCN-3的SIP协议一致性测试方法研究北方工业大学信息工程学院,北京100041软件测试42刘向玲余梅生多层Ad hoc网络中基于身份的密钥管理方案燕山大学信息科学与工程学院秦皇岛066004容错技术43卓红艳可靠性指标分配方法研究中国工程物理研究院应用电子学研究所四川绵阳919-1011信箱621900容错技术44赵会群, 王恩雷,赵洁一种TTCN-3测试套自动转化为编码解码器的方法研究及应用北方工业大学信息工程学院, 北京 100041软件测试45江燕辉,张金艺,林峰,王佳多时钟域SOC的TAM优化与测试调度上海大学微电子中心数字测试46葛樑应对RF SOC/SIP量产测试挑战惠瑞捷半导体(上海)有限公司AMS测试47Xing Jie, Wang Mingxiang New Architecture in flash memory testing toachieve throughput enhancementSpansion China Limited, No33 Xing HaiStreet, SIP Suzhou, 215021数字测试48梁伟毕经平Internet路由关联分析与监测系统设计中国科学院计算技术研究所软件测试49张颖 李华伟 李晓维SOC总线串扰的精简MT测试集中国科学院计算技术研究所计算机系统结构重点实验室数字测试50苏志勇李必信基于体系结构的Web服务可靠性建模东南大学计算机科学与工程学院,南京210096容错技术51周志远, 张大方, 缪力,赵丹,黄谷基于Java内存模型的并发程序模型检测湖南大学软件学院,湖南长沙,410082软件测试53Qi Tang Design for Load Regulation Production Test ofPMIC devicesVerigy (Shanghai) Co., Ltd数字测试54李华叶新铭吴承勇王龙王玲玲一种互操作测试的建模及测试选择方法内蒙古大学,计算机学院,呼和浩特市010021软件测试55Lu Ming The Optimized Test Solution for Mass Productionof High-performanceVerigy (Shanghai) Co., Ltd Shanghai201203AMS测试56刘炎华景为平孙玲一种传感器信号处理电路测试方法研究南通大学江苏省专用集成电路设计重点实验室,江苏南通 226019AMS测试57蒋方纯基于覆盖率的组合测试在游戏软件测试中的应用与分析深圳信息职业技术学院,广东深圳518029软件测试58付剑平陆民燕软件测试性设计综述北京航空航天大学工程系统工程系, 北京100083软件测试59张德平,聂长海,徐宝文划分测试用例选择策略研究东南大学计算机科学与工程学院,江苏南京 210096软件测试60李伟,王志功,李智群S参数测试校准技术中SOLT和TRL校准方法的比较东南大学射频与光电集成电路研究所,南京市四牌楼2号,210096AMS测试61崔江,王友仁基于DAGSVC的模拟软故障字典诊断方法南京航空航天大学自动化学院,江苏南京,210016AMS测试62欧阳思华,吴锦,李艳奎,刘新宇基于Agilent VEE的HEMT器件直流自动化测试系统中国科学院微电子研究所ATE应用64刘炜石志刚张琳FM发射芯片测试技术研究北京华大泰思特半导体检测技术有限公司ATE应用65张岩峰,王和兴,王翠荣,高远基于虚拟化技术的网络测试床的设计与实现东北大学秦皇岛分校,秦皇岛 066004软件测试66黄正峰梁华国陈田詹文法孙科一种容软错误的高可靠BIST结构合肥工业大学计算机与信息学院合肥230009数字测试67王佳李华叶新铭杭成宝基于NTP协议的时间同步服务的测试设计与实现内蒙古大学计算机学院呼和浩特市010021软件测试68吴为民基于二元CSP的RTL数据通路可满足性求解方法北京交通大学计算机与信息技术学院,北京,100044设计验证71鲍国民郑成文韩柯软件可靠性J—M模型的改进研究中国人民解放军通信指挥学院研究生管理大队软件测试72鲍国民聂剑平韩柯基于未确知理论的软件可靠性模型研究中国人民解放军通信指挥学院研究生管理大队软件测试73于磊,傅常顺基于度量的软件测试过程管理解放军信息工程大学信息工程学院,河南郑州,450002软件测试74张悦尤枫赵瑞莲利用蚁群算法实现基于程序结构的主变元分析北京化工大学信息科学与技术学院北京100029软件测试75李征, 赵瑞莲基于领域的程序切片准则的依赖性分析北京化工大学计算机科学系北京 100029软件测试77李光辉冯冬芹曾松伟基于拓扑结构分析的等价性验证方法浙江林学院信息工程学院杭州 311300设计验证78Kent Luehman, Yin Kun Interesting Applications of Digital Source andDigital CaptureVerigy ATE应用80王雅文宫云战肖庆杨朝红区间运算在软件缺陷检测中的应用北京邮电大学网络与交换技术国家重点实验室软件测试81吴子敬宫云战基于区间运算和组测试求解CSP以及在测试用例自动生成上的应用北京邮电大学计算机科学与技术交换与智能控制国家重点实验室软件测试83江标宫云战杨朝红非法计算检测的通用模型北京邮电大学网络与交换技术国家重点实验室软件测试84李春明代码风格所引起形式验证失配问题的分析江南计算技术研究所设计验证86Shu Xia, Xiu-Lan Cheng VLSI Test Education for University Students inChinaApplications Development Center,Teradyne (Shanghai) Co., Ltd.数字测试90周旭顾卫标倪红军朱昱电磁辐射接收机低频段全数字化设计南通大学,江苏南通 226019AMS测试91刘健,闫伟LED器件热阻测试仪的研制中国电子科技集团公司第十三研究所,石家庄 050051ATE应用92Kun Xiao,shihong Chen,Jian Xiao基于顺序图的面向方面动态编织测试School of Computer, Wuhan University软件测试93莫毓昌, 刘宏伟, 左德承, 杨孝宗FTCL: 面向Statechart描述的测试用例集自动生成工具计算机科学与技术学院, 哈尔滨工业大学软件测试94张广梅李劲松基于随机测试的软件可靠性评估山东农业大学信息科学与工程学院软件测试95潘送军胡瑜李晓维多核处理器瞬态故障敏感性分析中国科学院计算机系统结构重点实验室容错技术96Dong Xiang Boxue Yin Zhen Chen Conflict-Avoidance-Driven Test Generation andTest Point Insertionfor Transition Faults in Broadside Scan TestingTsinghua University数字测试97邝继顺刘钦尤志强由被测电路自己产生测试向量的“自动测试向量生成湖南大学计算机与通信学院数字测试99张旻晋李华伟李晓维面向最大串扰噪声的测试生成方法中国科学院计算技术研究所数字测试100Tongdan Jin, Shu Xia, Xiu-LanChengManaging ATE Maintenance to Reduce DeviceTesting CostTexas A&M International University ATE应用101王保青,梁华国,詹文法组扩展编码在测试数据压缩中的应用合肥工业大学计算机与信息学院数字测试103戈倩,高建华一种定位面向对象软件中回归测试错误的方法上海师范大学数理信息学院计算机与工程系软件测试104李明明关于串行A/D转换器静态参数测试技术的研究北京微电子技术研究所北京市丰台区东高地四营门北路2号AMS测试105谢远江,王达,胡瑜,李晓维用CAM作为冗余单元提高存储器修复率的内建自修复机制中国科学院计算技术研究所系统结构重点实验室容错技术107马明朗DAC静态参数测试技术研究中国航天时代电子公司北京微电子技术研究所AMS测试108张涛DIB design rules for testability and reliability Teradyne (Shanghai) Co., Ltd ATE应用110王之韡,高建华一种基于修改影响分析方法的错误定位技术上海师范大学计算机科学与工程系软件测试111刘亚飞,尚利宏容错CAN总线测试平台的研究和实现北京航空航天大学601教研室容错技术112周彬叶以正王志伟基于TRC重播种的二维测试数据压缩哈尔滨工业大学微电子中心数字测试116曹贝肖立伊王永生基于非一致CA的低功耗确定测试向量发生器的设计哈尔滨工业大学微电子中心数字测试117付斌章韩银和李华伟李晓维针对基于片上网络(NoC)的芯片的单向虚拟测试总线中国科学院计算技术研究所系统结构重点实验室数字测试118成永升,尤志强,邝继顺扩展相容性扫描树中的测试响应压缩器设计湖南大学计算机与通信学院数字测试120贺志容韩红星胡勇93K集成电路测试系统参考源校准方法研究武汉数字工程研究所ATE应用121靳昂,江建慧Java程序故障模式及故障注入方案同济大学计算机科学与技术系软件测试122王达,胡瑜,李晓维Flash存储器测试与修复方法概述中国科学院计算技术研究所系统结构重点实验室容错技术123王飞胡瑜李晓维一种确定性扫描链故障诊断向量的生成方法中国科学院计算技术研究所计算机系统结构重点实验室数字测试125王天成,吕涛,李晓维RTL错误注入的方法和实现中国科学院计算机系统结构重点实验室设计验证126张蕊江建慧楼俊钢沈君华王艳娜钱逢安基于B/S结构的嵌入式软件和系统测试平台同济大学计算机科学与技术系软件测试127蒙喜鹏 林建京一种以应用为导向的非接触射频卡芯片的全新测试方法北京微电子技术研究所ATE应用128刘品谢永乐LOT滤波器组在模拟集成电路故障诊断中的应用电子科技大学自动化工程学院AMS测试129褚彦明,朱经纷软件复杂度的评估和实现上海大学计算机工程与科学学院软件测试130李瑞麟大规模生产测试中的关键环节——连接性测试北京华大泰思特半导体检测技术有限公司ATE应用131施银盾,朱经纷软件可靠性模型综合量化分析上海大学计算机学院软件测试132张慧曲芳王剑超大规模集成电路测试开发技术及流程江南计算技术研究所ATE应用133曲芳陈冬林敏基于SAPPHIRE测试系统的VCD测试向量转换江南计算技术研究所ATE应用134陆晔蒋炎河张树文模拟锁相环解码器SE567测试实现江南计算技术研究所AMS测试135王剑陆晔张树文应用DOE提升大尺寸封装高速芯片的机测良率江南计算技术研究所ATE应用137史圣兵,靳洋,王红,牛道恒,杨士元行为级可测性综合平台综合模块的设计与实现清华大学自动化系数字测试138蒋翠云 梁华国 陶珏辉 陈田测试数据分块字典统计编码压缩法合肥工业大学理学院 合肥工业大学计算机与信息学院数字测试2. 会议张贴论文 (Post-papers)ID Author Title Organization Topic1张嘉怡, 刘建文, 伍川辉基于ZigBee的无线传感器网络在煤矿安全监测中的应用西南交通大学, 中科院成都计算机应用研究所(中科信息)容错技术3任继平, 王占武基于GJB 2725A的软件测试质量管理体系北京跟踪与通信技术研究所软件测试8高淼标准测试数据格式(STDF)文件的研究英飞凌科技有限公司邮编 710075ATE应用9何剑伟, 任继平, 王占武配置管理在软件测试项目中的应用中国卫星海上测控部(CSMTC),江苏省江阴市103信箱500号,214431软件测试10吉国凡, 王惠降低SOC芯片测试成本的有效方法北京华大泰思特特半导体检测技术有限公司ATE应用11潘振兴,谢涛一种低通信开销的DDoS异常检测模型国防科技大学计算机学院湖南长沙容错技术13王冠军,马光胜,聂东虎双阀值VLSI低测试功耗方法研究哈尔滨工程大学计算机科学与技术学院数字测试19于秀山,董昕Quick-Design在组合测试中的应用中国电子系统设备工程公司研究所软件测试22方建乾如何基于产品测试硬件进行IC高速接口时序特性参数测量英飞凌科技(西安)有限公司数字测试23甘泽洲一种支持自动化测试的测试管理工具的实现北京工业大学计算机学院软件测试25胡勇,吴丹,沈森祖,石坚基于Verigy 93000测试系统的存储器测试方法研究和实现武汉数字工程研究所ATE应用26葛先军,李志勇,宋巍巍基于网页恶意脚本链接分析的木马检测技术海军航空工程学院,山东烟台容错技术30钱军边界扫描技术在测试BS-NBS结构电路上的应用哈尔滨工业大学移动计算研究中心,哈尔滨150001数字测试31丁俊民孙玲刘炎华一种音频功率放大器测试方案设计南通大学,南通 226007AMS测试34洪继奎,刘军基于PKI和USB Key的网络信息系统安全认证研究解放军理工大学通信工程学院研究生一队;江苏南京;210007容错技术35李颖悟在系统级JTAG应用中识别单板类型的方法华为技术有限公司数字测试52张毅王鸿软件可靠性测试实例分析中物院总体工程研究所,四川绵阳919信箱402分箱,621900软件测试63张坚Detecting Opens in Fan-out Mode for FlashTestingVerigy (Shanghai) Co., Ltd.Shanghai 201203 P.R.China数字测试69廖明燕基于边界扫描的电路互联故障诊断研究中国石油大学信息与控制工程学院山东东营 257061数字测试70钱军,左德承,苗百利,杨孝宗基于JTAG的故障注入研究哈尔滨工业大学移动计算研究中心,哈尔滨150001数字测试76Tian-Junfeng,Chen-Xiaoxiang, LiuTaoA Trust Evaluation Model Based on SemiringInstitute of Computer NetworkTechnology, Hebei University, Baoding071002, China容错技术79刘玉林,李华基于UCM的组件集成测试方法内蒙古大学计算机学院,呼和浩特软件测试82白哥乐, 宫云战, 杨朝红基于源码分析的软件安全测试工具综述北京邮电大学网络与交换技术国家重点实验室软件测试85张小孟一种集成电路脉冲波峰值电压的测试方法北京微电子技术研究所北京100076ATE应用87周旭顾卫标倪红军朱昱EMC自动测试系统中光纤通信设计南通大学,江苏南通 226019ATE应用88周旭顾卫标倪红军朱昱主从式电磁辐射自动测试系统南通大学,江苏南通 226019ATE应用89周旭顾卫标倪红军朱昱高频传输室过渡接头内导体的形状优化设计南通大学,江苏南通 226019ATE应用98李鉴睿吴坚Introduction to Image Sensor Device Testing泰瑞达(上海)有限公司ATE应用102武晋南高建华基于User-Session的Web测试集简化方法上海师范大学计算机科学与工程系软件测试106史君浅析存储器的测试原理及方法时代民芯科技有限公司数字测试109刘文捷石坚微电子标准样片制备研究国防微电子一级站(中船重工第七0九数字测试113周彬叶以正李兆麟基于贪心行列消去算法的测试集优化哈尔滨工业大学微电子中心数字测试114翟志华单锦辉孙萍软件故障预防方法探讨黄河水利职业技术学院自动化工程系软件测试115王璇李泽民非法计算故障的检测方法研究装甲兵工程学院信息工程系软件测试119韩红星PCF8563芯片的测试程序开发研究武汉数字工程研究所数字测试124辛敏杰影响GUI自动化测试性能的因素分析上海师范大学计算机科学与技术系软件测试136刘恕NAND Flash的ECC分级及其在ATE设备中的测试方法爱德万测试(苏州有限公司)上海分公司数字测试139方南晖,叶卫东如何从流程上保证系统测试的质量中国南方航空公司信息中心软件测试140孙加兴,孟德刚数字软IP核评测与认证方法和流程信息产业部软件与集成电路促进中心数字测试141孟德刚,邱善勤,谢学军,孙加兴基于JTAG扫描链的嵌入式处理器IP核调试方法研究信息产业部软件与集成电路促进中心数字测试。

四大安全会议论文题目

四大安全会议论文题目

2009and2010Papers:Big-4Security ConferencespvoOctober13,2010NDSS20091.Document Structure Integrity:A Robust Basis for Cross-site Scripting Defense.Y.Nadji,P.Saxena,D.Song2.An Efficient Black-box Technique for Defeating Web Application Attacks.R.Sekar3.Noncespaces:Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.M.Van Gundy,H.Chen4.The Blind Stone Tablet:Outsourcing Durability to Untrusted Parties.P.Williams,R.Sion,D.Shasha5.Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.S.S.M.Chow,J.-H.Lee,L.Subramanian6.SybilInfer:Detecting Sybil Nodes using Social Networks.G.Danezis,P.Mittal7.Spectrogram:A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.Yingbo Song,Angelos D.Keromytis,Salvatore J.Stolfo8.Detecting Forged TCP Reset Packets.Nicholas Weaver,Robin Sommer,Vern Paxson9.Coordinated Scan Detection.Carrie Gates10.RB-Seeker:Auto-detection of Redirection Botnets.Xin Hu,Matthew Knysz,Kang G.Shin11.Scalable,Behavior-Based Malware Clustering.Ulrich Bayer,Paolo Milani Comparetti,Clemens Hlauschek,Christopher Kruegel,Engin Kirda12.K-Tracer:A System for Extracting Kernel Malware Behavior.Andrea Lanzi,Monirul I.Sharif,Wenke Lee13.RAINBOW:A Robust And Invisible Non-Blind Watermark for Network Flows.Amir Houmansadr,Negar Kiyavash,Nikita Borisov14.Traffic Morphing:An Efficient Defense Against Statistical Traffic Analysis.Charles V.Wright,Scott E.Coull,Fabian Monrose15.Recursive DNS Architectures and Vulnerability Implications.David Dagon,Manos Antonakakis,Kevin Day,Xiapu Luo,Christopher P.Lee,Wenke Lee16.Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.Hong Chen,Ninghui Li,Ziqing Mao17.IntScope:Automatically Detecting Integer Overflow Vulnerability in X86Binary Using Symbolic Execution.Tielei Wang,Tao Wei,Zhiqiang Lin,Wei Zou18.Safe Passage for Passwords and Other Sensitive Data.Jonathan M.McCune,Adrian Perrig,Michael K.Reiter19.Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.Chris Karlof,J.Doug Tygar,David Wagner20.CSAR:A Practical and Provable Technique to Make Randomized Systems Accountable.Michael Backes,Peter Druschel,Andreas Haeberlen,Dominique UnruhOakland20091.Wirelessly Pickpocketing a Mifare Classic Card.(Best Practical Paper Award)Flavio D.Garcia,Peter van Rossum,Roel Verdult,Ronny Wichers Schreur2.Plaintext Recovery Attacks Against SSH.Martin R.Albrecht,Kenneth G.Paterson,Gaven J.Watson3.Exploiting Unix File-System Races via Algorithmic Complexity Attacks.Xiang Cai,Yuwei Gui,Rob Johnson4.Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86Processors.Bart Coppens,Ingrid Verbauwhede,Bjorn De Sutter,Koen De Bosschere5.Non-Interference for a Practical DIFC-Based Operating System.Maxwell Krohn,Eran Tromer6.Native Client:A Sandbox for Portable,Untrusted x86Native Code.(Best Paper Award)B.Yee,D.Sehr,G.Dardyk,B.Chen,R.Muth,T.Ormandy,S.Okasaka,N.Narula,N.Fullagar7.Automatic Reverse Engineering of Malware Emulators.(Best Student Paper Award)Monirul Sharif,Andrea Lanzi,Jonathon Giffin,Wenke Lee8.Prospex:Protocol Specification Extraction.Paolo Milani Comparetti,Gilbert Wondracek,Christopher Kruegel,Engin Kirda9.Quantifying Information Leaks in Outbound Web Traffic.Kevin Borders,Atul Prakash10.Automatic Discovery and Quantification of Information Leaks.Michael Backes,Boris Kopf,Andrey Rybalchenko11.CLAMP:Practical Prevention of Large-Scale Data Leaks.Bryan Parno,Jonathan M.McCune,Dan Wendlandt,David G.Andersen,Adrian Perrig12.De-anonymizing Social Networks.Arvind Narayanan,Vitaly Shmatikov13.Privacy Weaknesses in Biometric Sketches.Koen Simoens,Pim Tuyls,Bart Preneel14.The Mastermind Attack on Genomic Data.Michael T.Goodrich15.A Logic of Secure Systems and its Application to Trusted Computing.Anupam Datta,Jason Franklin,Deepak Garg,Dilsun Kaynar16.Formally Certifying the Security of Digital Signature Schemes.Santiago Zanella-Beguelin,Gilles Barthe,Benjamin Gregoire,Federico Olmedo17.An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.Ralf Kuesters,Tomasz Truderung18.Sphinx:A Compact and Provably Secure Mix Format.George Danezis,Ian Goldberg19.DSybil:Optimal Sybil-Resistance for Recommendation Systems.Haifeng Yu,Chenwei Shi,Michael Kaminsky,Phillip B.Gibbons,Feng Xiao20.Fingerprinting Blank Paper Using Commodity Scanners.William Clarkson,Tim Weyrich,Adam Finkelstein,Nadia Heninger,Alex Halderman,Ed Felten 21.Tempest in a Teapot:Compromising Reflections Revisited.Michael Backes,Tongbo Chen,Markus Duermuth,Hendrik P.A.Lensch,Martin Welk22.Blueprint:Robust Prevention of Cross-site Scripting Attacks for Existing Browsers.Mike Ter Louw,V.N.Venkatakrishnan23.Pretty-Bad-Proxy:An Overlooked Adversary in Browsers’HTTPS Deployments.Shuo Chen,Ziqing Mao,Yi-Min Wang,Ming Zhang24.Secure Content Sniffing for Web Browsers,or How to Stop Papers from Reviewing Themselves.Adam Barth,Juan Caballero,Dawn Song25.It’s No Secret:Measuring the Security and Reliability of Authentication via’Secret’Questions.Stuart Schechter,A.J.Bernheim Brush,Serge Egelman26.Password Cracking Using Probabilistic Context-Free Grammars.Matt Weir,Sudhir Aggarwal,Bill Glodek,Breno de MedeirosUSENIX Security2009promising Electromagnetic Emanations of Wired and Wireless Keyboards.(Outstanding Student Paper)Martin Vuagnoux,Sylvain Pasini2.Peeping Tom in the Neighborhood:Keystroke Eavesdropping on Multi-User Systems.Kehuan Zhang,XiaoFeng Wang3.A Practical Congestion Attack on Tor Using Long Paths,Nathan S.Evans,Roger Dingledine,Christian Grothoff4.Baggy Bounds Checking:An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.Periklis Akritidis,Manuel Costa,Miguel Castro,Steven Hand5.Dynamic Test Generation to Find Integer Bugs in x86Binary Linux Programs.David Molnar,Xue Cong Li,David A.Wagner6.NOZZLE:A Defense Against Heap-spraying Code Injection Attacks.Paruj Ratanaworabhan,Benjamin Livshits,Benjamin Zorn7.Detecting Spammers with SNARE:Spatio-temporal Network-level Automatic Reputation Engine.Shuang Hao,Nadeem Ahmed Syed,Nick Feamster,Alexander G.Gray,Sven Krasser8.Improving Tor using a TCP-over-DTLS Tunnel.Joel Reardon,Ian Goldberg9.Locating Prefix Hijackers using LOCK.Tongqing Qiu,Lusheng Ji,Dan Pei,Jia Wang,Jun(Jim)Xu,Hitesh Ballani10.GATEKEEPER:Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.Salvatore Guarnieri,Benjamin Livshits11.Cross-Origin JavaScript Capability Leaks:Detection,Exploitation,and Defense.Adam Barth,Joel Weinberger,Dawn Song12.Memory Safety for Low-Level Software/Hardware Interactions.John Criswell,Nicolas Geoffray,Vikram Adve13.Physical-layer Identification of RFID Devices.Boris Danev,Thomas S.Heydt-Benjamin,Srdjan CapkunCP:Secure Remote Storage for Computational RFIDs.Mastooreh Salajegheh,Shane Clark,Benjamin Ransford,Kevin Fu,Ari Juels15.Jamming-resistant Broadcast Communication without Shared Keys.Christina Popper,Mario Strasser,Srdjan Capkun16.xBook:Redesigning Privacy Control in Social Networking Platforms.Kapil Singh,Sumeer Bhola,Wenke Lee17.Nemesis:Preventing Authentication and Access Control Vulnerabilities in Web Applications.Michael Dalton,Christos Kozyrakis,Nickolai Zeldovich18.Static Enforcement of Web Application Integrity Through Strong Typing.William Robertson,Giovanni Vigna19.Vanish:Increasing Data Privacy with Self-Destructing Data.(Outstanding Student Paper)Roxana Geambasu,Tadayoshi Kohno,Amit A.Levy,Henry M.Levy20.Efficient Data Structures for Tamper-Evident Logging.Scott A.Crosby,Dan S.Wallach21.VPriv:Protecting Privacy in Location-Based Vehicular Services.Raluca Ada Popa,Hari Balakrishnan,Andrew J.Blumberg22.Effective and Efficient Malware Detection at the End Host.Clemens Kolbitsch,Paolo Milani Comparetti,Christopher Kruegel,Engin Kirda,Xiaoyong Zhou,XiaoFeng Wang 23.Protecting Confidential Data on Personal Computers with Storage Capsules.Kevin Borders,Eric Vander Weele,Billy Lau,Atul Prakash24.Return-Oriented Rootkits:Bypassing Kernel Code Integrity Protection Mechanisms.Ralf Hund,Thorsten Holz,Felix C.Freiling25.Crying Wolf:An Empirical Study of SSL Warning Effectiveness.Joshua Sunshine,Serge Egelman,Hazim Almuhimedi,Neha Atri,Lorrie Faith Cranor26.The Multi-Principal OS Construction of the Gazelle Web Browser.Helen J.Wang,Chris Grier,Alex Moshchuk,Samuel T.King,Piali Choudhury,Herman VenterACM CCS20091.Attacking cryptographic schemes based on”perturbation polynomials”.Martin Albrecht,Craig Gentry,Shai Halevi,Jonathan Katz2.Filter-resistant code injection on ARM.Yves Younan,Pieter Philippaerts,Frank Piessens,Wouter Joosen,Sven Lachmund,Thomas Walter3.False data injection attacks against state estimation in electric power grids.Yao Liu,Michael K.Reiter,Peng Ning4.EPC RFID tag security weaknesses and defenses:passport cards,enhanced drivers licenses,and beyond.Karl Koscher,Ari Juels,Vjekoslav Brajkovic,Tadayoshi Kohno5.An efficient forward private RFID protocol.Come Berbain,Olivier Billet,Jonathan Etrog,Henri Gilbert6.RFID privacy:relation between two notions,minimal condition,and efficient construction.Changshe Ma,Yingjiu Li,Robert H.Deng,Tieyan Li7.CoSP:a general framework for computational soundness proofs.Michael Backes,Dennis Hofheinz,Dominique Unruh8.Reactive noninterference.Aaron Bohannon,Benjamin C.Pierce,Vilhelm Sjoberg,Stephanie Weirich,Steve Zdancewicputational soundness for key exchange protocols with symmetric encryption.Ralf Kusters,Max Tuengerthal10.A probabilistic approach to hybrid role mining.Mario Frank,Andreas P.Streich,David A.Basin,Joachim M.Buhmann11.Efficient pseudorandom functions from the decisional linear assumption and weaker variants.Allison B.Lewko,Brent Waters12.Improving privacy and security in multi-authority attribute-based encryption.Melissa Chase,Sherman S.M.Chow13.Oblivious transfer with access control.Jan Camenisch,Maria Dubovitskaya,Gregory Neven14.NISAN:network information service for anonymization networks.Andriy Panchenko,Stefan Richter,Arne Rache15.Certificateless onion routing.Dario Catalano,Dario Fiore,Rosario Gennaro16.ShadowWalker:peer-to-peer anonymous communication using redundant structured topologies.Prateek Mittal,Nikita Borisov17.Ripley:automatically securing web2.0applications through replicated execution.K.Vikram,Abhishek Prateek,V.Benjamin Livshits18.HAIL:a high-availability and integrity layer for cloud storage.Kevin D.Bowers,Ari Juels,Alina Oprea19.Hey,you,get offof my cloud:exploring information leakage in third-party compute clouds.Thomas Ristenpart,Eran Tromer,Hovav Shacham,Stefan Savage20.Dynamic provable data possession.C.Christopher Erway,Alptekin Kupcu,Charalampos Papamanthou,Roberto Tamassia21.On cellular botnets:measuring the impact of malicious devices on a cellular network core.Patrick Traynor,Michael Lin,Machigar Ongtang,Vikhyath Rao,Trent Jaeger,Patrick Drew McDaniel,Thomas Porta 22.On lightweight mobile phone application certification.William Enck,Machigar Ongtang,Patrick Drew McDaniel23.SMILE:encounter-based trust for mobile social services.Justin Manweiler,Ryan Scudellari,Landon P.Cox24.Battle of Botcraft:fighting bots in online games with human observational proofs.Steven Gianvecchio,Zhenyu Wu,Mengjun Xie,Haining Wang25.Fides:remote anomaly-based cheat detection using client emulation.Edward C.Kaiser,Wu-chang Feng,Travis Schluessler26.Behavior based software theft detection.Xinran Wang,Yoon-chan Jhi,Sencun Zhu,Peng Liu27.The fable of the bees:incentivizing robust revocation decision making in ad hoc networks.Steffen Reidt,Mudhakar Srivatsa,Shane Balfe28.Effective implementation of the cell broadband engineTM isolation loader.Masana Murase,Kanna Shimizu,Wilfred Plouffe,Masaharu Sakamoto29.On achieving good operating points on an ROC plane using stochastic anomaly score prediction.Muhammad Qasim Ali,Hassan Khan,Ali Sajjad,Syed Ali Khayam30.On non-cooperative location privacy:a game-theoretic analysis.Julien Freudiger,Mohammad Hossein Manshaei,Jean-Pierre Hubaux,David C.Parkes31.Privacy-preserving genomic computation through program specialization.Rui Wang,XiaoFeng Wang,Zhou Li,Haixu Tang,Michael K.Reiter,Zheng Dong32.Feeling-based location privacy protection for location-based services.Toby Xu,Ying Cai33.Multi-party off-the-record messaging.Ian Goldberg,Berkant Ustaoglu,Matthew Van Gundy,Hao Chen34.The bayesian traffic analysis of mix networks.Carmela Troncoso,George Danezis35.As-awareness in Tor path selection.Matthew Edman,Paul F.Syverson36.Membership-concealing overlay networks.Eugene Y.Vasserman,Rob Jansen,James Tyra,Nicholas Hopper,Yongdae Kim37.On the difficulty of software-based attestation of embedded devices.Claude Castelluccia,Aurelien Francillon,Daniele Perito,Claudio Soriente38.Proximity-based access control for implantable medical devices.Kasper Bonne Rasmussen,Claude Castelluccia,Thomas S.Heydt-Benjamin,Srdjan Capkun39.XCS:cross channel scripting and its impact on web applications.Hristo Bojinov,Elie Bursztein,Dan Boneh40.A security-preserving compiler for distributed programs:from information-flow policies to cryptographic mechanisms.Cedric Fournet,Gurvan Le Guernic,Tamara Rezk41.Finding bugs in exceptional situations of JNI programs.Siliang Li,Gang Tan42.Secure open source collaboration:an empirical study of Linus’law.Andrew Meneely,Laurie A.Williams43.On voting machine design for verification and testability.Cynthia Sturton,Susmit Jha,Sanjit A.Seshia,David Wagner44.Secure in-VM monitoring using hardware virtualization.Monirul I.Sharif,Wenke Lee,Weidong Cui,Andrea Lanzi45.A metadata calculus for secure information sharing.Mudhakar Srivatsa,Dakshi Agrawal,Steffen Reidt46.Multiple password interference in text passwords and click-based graphical passwords.Sonia Chiasson,Alain Forget,Elizabeth Stobert,Paul C.van Oorschot,Robert Biddle47.Can they hear me now?:a security analysis of law enforcement wiretaps.Micah Sherr,Gaurav Shah,Eric Cronin,Sandy Clark,Matt Blaze48.English shellcode.Joshua Mason,Sam Small,Fabian Monrose,Greg MacManus49.Learning your identity and disease from research papers:information leaks in genome wide association study.Rui Wang,Yong Fuga Li,XiaoFeng Wang,Haixu Tang,Xiao-yong Zhou50.Countering kernel rootkits with lightweight hook protection.Zhi Wang,Xuxian Jiang,Weidong Cui,Peng Ning51.Mapping kernel objects to enable systematic integrity checking.Martim Carbone,Weidong Cui,Long Lu,Wenke Lee,Marcus Peinado,Xuxian Jiang52.Robust signatures for kernel data structures.Brendan Dolan-Gavitt,Abhinav Srivastava,Patrick Traynor,Jonathon T.Giffin53.A new cell counter based attack against tor.Zhen Ling,Junzhou Luo,Wei Yu,Xinwen Fu,Dong Xuan,Weijia Jia54.Scalable onion routing with torsk.Jon McLachlan,Andrew Tran,Nicholas Hopper,Yongdae Kim55.Anonymous credentials on a standard java card.Patrik Bichsel,Jan Camenisch,Thomas Gros,Victor Shouprge-scale malware indexing using function-call graphs.Xin Hu,Tzi-cker Chiueh,Kang G.Shin57.Dispatcher:enabling active botnet infiltration using automatic protocol reverse-engineering.Juan Caballero,Pongsin Poosankam,Christian Kreibich,Dawn Xiaodong Song58.Your botnet is my botnet:analysis of a botnet takeover.Brett Stone-Gross,Marco Cova,Lorenzo Cavallaro,Bob Gilbert,MartinSzydlowski,Richard A.Kemmerer,Christopher Kruegel,Giovanni VignaNDSS20101.Server-side Verification of Client Behavior in Online Games.Darrell Bethea,Robert Cochran and Michael Reiter2.Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.S.Wolchok,O.S.Hofmann,N.Heninger,E.W.Felten,J.A.Halderman,C.J.Rossbach,B.Waters,E.Witchel3.Stealth DoS Attacks on Secure Channels.Amir Herzberg and Haya Shulman4.Protecting Browsers from Extension Vulnerabilities.Adam Barth,Adrienne Porter Felt,Prateek Saxena,and Aaron Boodman5.Adnostic:Privacy Preserving Targeted Advertising.Vincent Toubiana,Arvind Narayanan,Dan Boneh,Helen Nissenbaum and Solon Barocas6.FLAX:Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.Prateek Saxena,Steve Hanna,Pongsin Poosankam and Dawn Song7.Effective Anomaly Detection with Scarce Training Data.William Robertson,Federico Maggi,Christopher Kruegel and Giovanni Vignarge-Scale Automatic Classification of Phishing Pages.Colin Whittaker,Brian Ryner and Marria Nazif9.A Systematic Characterization of IM Threats using Honeypots.Iasonas Polakis,Thanasis Petsas,Evangelos P.Markatos and Spiros Antonatos10.On Network-level Clusters for Spam Detection.Zhiyun Qian,Zhuoqing Mao,Yinglian Xie and Fang Yu11.Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.Sushant Sinha,Michael Bailey and Farnam Jahanian12.Botnet Judo:Fighting Spam with Itself.A.Pitsillidis,K.Levchenko,C.Kreibich,C.Kanich,G.M.Voelker,V.Paxson,N.Weaver,S.Savage13.Contractual Anonymity.Edward J.Schwartz,David Brumley and Jonathan M.McCune14.A3:An Extensible Platform for Application-Aware Anonymity.Micah Sherr,Andrew Mao,William R.Marczak,Wenchao Zhou,Boon Thau Loo,and Matt Blaze15.When Good Randomness Goes Bad:Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.Thomas Ristenpart and Scott Yilek16.InvisiType:Object-Oriented Security Policies.Jiwon Seo and Monica m17.A Security Evaluation of DNSSEC with NSEC3.Jason Bau and John Mitchell18.On the Safety of Enterprise Policy Deployment.Yudong Gao,Ni Pan,Xu Chen and Z.Morley Mao19.Where Do You Want to Go Today?Escalating Privileges by Pathname Manipulation.Suresh Chari,Shai Halevi and Wietse Venema20.Joe-E:A Security-Oriented Subset of Java.Adrian Mettler,David Wagner and Tyler Close21.Preventing Capability Leaks in Secure JavaScript Subsets.Matthew Finifter,Joel Weinberger and Adam Barth22.Binary Code Extraction and Interface Identification for Security Applications.Juan Caballero,Noah M.Johnson,Stephen McCamant,and Dawn Song23.Automatic Reverse Engineering of Data Structures from Binary Execution.Zhiqiang Lin,Xiangyu Zhang and Dongyan Xu24.Efficient Detection of Split Personalities in Malware.Davide Balzarotti,Marco Cova,Christoph Karlberger,Engin Kirda,Christopher Kruegel and Giovanni VignaOakland20101.Inspector Gadget:Automated Extraction of Proprietary Gadgets from Malware Binaries.Clemens Kolbitsch Thorsten Holz,Christopher Kruegel,Engin Kirda2.Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.Matt Fredrikson,Mihai Christodorescu,Somesh Jha,Reiner Sailer,Xifeng Yan3.Identifying Dormant Functionality in Malware Programs.Paolo Milani Comparetti,Guido Salvaneschi,Clemens Kolbitsch,Engin Kirda,Christopher Kruegel,Stefano Zanero4.Reconciling Belief and Vulnerability in Information Flow.Sardaouna Hamadou,Vladimiro Sassone,Palamidessi5.Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.Bruno P.S.Rocha,Sruthi Bandhakavi,Jerry I.den Hartog,William H.Winsborough,Sandro Etalle6.Non-Interference Through Secure Multi-Execution.Dominique Devriese,Frank Piessens7.Object Capabilities and Isolation of Untrusted Web Applications.Sergio Maffeis,John C.Mitchell,Ankur Taly8.TrustVisor:Efficient TCB Reduction and Attestation.Jonathan McCune,Yanlin Li,Ning Qu,Zongwei Zhou,Anupam Datta,Virgil Gligor,Adrian Perrig9.Overcoming an Untrusted Computing Base:Detecting and Removing Malicious Hardware Automatically.Matthew Hicks,Murph Finnicum,Samuel T.King,Milo M.K.Martin,Jonathan M.Smith10.Tamper Evident Microprocessors.Adam Waksman,Simha Sethumadhavan11.Side-Channel Leaks in Web Applications:a Reality Today,a Challenge Tomorrow.Shuo Chen,Rui Wang,XiaoFeng Wang Kehuan Zhang12.Investigation of Triangular Spamming:a Stealthy and Efficient Spamming Technique.Zhiyun Qian,Z.Morley Mao,Yinglian Xie,Fang Yu13.A Practical Attack to De-Anonymize Social Network Users.Gilbert Wondracek,Thorsten Holz,Engin Kirda,Christopher Kruegel14.SCiFI-A System for Secure Face Identification.(Best Paper)Margarita Osadchy,Benny Pinkas,Ayman Jarrous,Boaz Moskovich15.Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.Haowen Chan,Adrian Perrig16.Revocation Systems with Very Small Private Keys.Allison Lewko,Amit Sahai,Brent Waters17.Authenticating Primary Users’Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.Yao Liu,Peng Ning,Huaiyu Dai18.Outside the Closed World:On Using Machine Learning For Network Intrusion Detection.Robin Sommer,Vern Paxson19.All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution(but might have been afraid to ask).Thanassis Avgerinos,Edward Schwartz,David Brumley20.State of the Art:Automated Black-Box Web Application Vulnerability Testing.Jason Bau,Elie Bursztein,Divij Gupta,John Mitchell21.A Proof-Carrying File System.Deepak Garg,Frank Pfenning22.Scalable Parametric Verification of Secure Systems:How to Verify Ref.Monitors without Worrying about Data Structure Size.Jason Franklin,Sagar Chaki,Anupam Datta,Arvind Seshadri23.HyperSafe:A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.Zhi Wang,Xuxian Jiang24.How Good are Humans at Solving CAPTCHAs?A Large Scale Evaluation.Elie Bursztein,Steven Bethard,John C.Mitchell,Dan Jurafsky,Celine Fabry25.Bootstrapping Trust in Commodity Computers.Bryan Parno,Jonathan M.McCune,Adrian Perrig26.Chip and PIN is Broken.(Best Practical Paper)Steven J.Murdoch,Saar Drimer,Ross Anderson,Mike Bond27.Experimental Security Analysis of a Modern Automobile.K.Koscher,A.Czeskis,F.Roesner,S.Patel,T.Kohno,S.Checkoway,D.McCoy,B.Kantor,D.Anderson,H.Shacham,S.Savage 28.On the Incoherencies in Web Browser Access Control Policies.Kapil Singh,Alexander Moshchuk,Helen J.Wang,Wenke Lee29.ConScript:Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.Leo Meyerovich,Benjamin Livshits30.TaintScope:A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.(Best Student Paper)Tielei Wang,Tao Wei,Guofei Gu,Wei Zou31.A Symbolic Execution Framework for JavaScript.Prateek Saxena,Devdatta Akhawe,Steve Hanna,Stephen McCamant,Dawn Song,Feng MaoUSENIX Security20101.Adapting Software Fault Isolation to Contemporary CPU Architectures.David Sehr,Robert Muth,CliffBiffle,Victor Khimenko,Egor Pasko,Karl Schimpf,Bennet Yee,Brad Chen2.Making Linux Protection Mechanisms Egalitarian with UserFS.Taesoo Kim and Nickolai Zeldovich3.Capsicum:Practical Capabilities for UNIX.(Best Student Paper)Robert N.M.Watson,Jonathan Anderson,Ben Laurie,Kris Kennaway4.Structuring Protocol Implementations to Protect Sensitive Data.Petr Marchenko,Brad Karp5.PrETP:Privacy-Preserving Electronic Toll Pricing.Josep Balasch,Alfredo Rial,Carmela Troncoso,Bart Preneel,Ingrid Verbauwhede,Christophe Geuens6.An Analysis of Private Browsing Modes in Modern Browsers.Gaurav Aggarwal,Elie Bursztein,Collin Jackson,Dan Boneh7.BotGrep:Finding P2P Bots with Structured Graph Analysis.Shishir Nagaraja,Prateek Mittal,Chi-Yao Hong,Matthew Caesar,Nikita Borisov8.Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems.Chad R.Meiners,Jignesh Patel,Eric Norige,Eric Torng,Alex X.Liu9.Searching the Searchers with SearchAudit.John P.John,Fang Yu,Yinglian Xie,Martin Abadi,Arvind Krishnamurthy10.Toward Automated Detection of Logic Vulnerabilities in Web Applications.Viktoria Felmetsger,Ludovico Cavedon,Christopher Kruegel,Giovanni Vigna11.Baaz:A System for Detecting Access Control Misconfigurations.Tathagata Das,Ranjita Bhagwan,Prasad Naldurg12.Cling:A Memory Allocator to Mitigate Dangling Pointers.Periklis Akritidis13.ZKPDL:A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.Sarah Meiklejohn,C.Chris Erway,Alptekin Kupcu,Theodora Hinkle,Anna Lysyanskaya14.P4P:Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users.Yitao Duan,John Canny,Justin Zhan,15.SEPIA:Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics.Martin Burkhart,Mario Strasser,Dilip Many,Xenofontas Dimitropoulos16.Dude,Where’s That IP?Circumventing Measurement-based IP Geolocation.Phillipa Gill,Yashar Ganjali,Bernard Wong,David Lie17.Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.Roya Ensafi,Jong Chun Park,Deepak Kapur,Jedidiah R.Crandall18.Building a Dynamic Reputation System for DNS.Manos Antonakakis,Roberto Perdisci,David Dagon,Wenke Lee,Nick Feamster19.Scantegrity II Municipal Election at Takoma Park:The First E2E Binding Governmental Election with Ballot Privacy.R.Carback,D.Chaum,J.Clark,J.Conway,A.Essex,P.S.Herrnson,T.Mayberry,S.Popoveniuc,R.L.Rivest,E.Shen,A.T.Sherman,P.L.Vora20.Acoustic Side-Channel Attacks on Printers.Michael Backes,Markus Durmuth,Sebastian Gerling,Manfred Pinkal,Caroline Sporleder21.Security and Privacy Vulnerabilities of In-Car Wireless Networks:A Tire Pressure Monitoring System Case Study.Ishtiaq Rouf,Rob Miller,Hossen Mustafa,Travis Taylor,Sangho Oh,Wenyuan Xu,Marco Gruteser,Wade Trappe,Ivan Seskar 22.VEX:Vetting Browser Extensions for Security Vulnerabilities.(Best Paper)Sruthi Bandhakavi,Samuel T.King,P.Madhusudan,Marianne Winslett23.Securing Script-Based Extensibility in Web Browsers.Vladan Djeric,Ashvin Goel24.AdJail:Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.Mike Ter Louw,Karthik Thotta Ganesh,V.N.Venkatakrishnan25.Realization of RF Distance Bounding.Kasper Bonne Rasmussen,Srdjan Capkun26.The Case for Ubiquitous Transport-Level Encryption.Andrea Bittau,Michael Hamburg,Mark Handley,David Mazieres,Dan Boneh27.Automatic Generation of Remediation Procedures for Malware Infections.Roberto Paleari,Lorenzo Martignoni,Emanuele Passerini,Drew Davidson,Matt Fredrikson,Jon Giffin,Somesh Jha28.Re:CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.Marti Motoyama,Kirill Levchenko,Chris Kanich,Damon McCoy,Geoffrey M.Voelker,Stefan Savage29.Chipping Away at Censorship Firewalls with User-Generated Content.Sam Burnett,Nick Feamster,Santosh Vempala30.Fighting Coercion Attacks in Key Generation using Skin Conductance.Payas Gupta,Debin GaoACM CCS20101.Security Analysis of India’s Electronic Voting Machines.Scott Wolchok,Erik Wustrow,J.Alex Halderman,Hari Prasad,Rop Gonggrijp2.Dissecting One Click Frauds.Nicolas Christin,Sally S.Yanagihara,Keisuke Kamataki3.@spam:The Underground on140Characters or Less.Chris Grier,Kurt Thomas,Vern Paxson,Michael Zhang4.HyperSentry:Enabling Stealthy In-context Measurement of Hypervisor Integrity.Ahmed M.Azab,Peng Ning,Zhi Wang,Xuxian Jiang,Xiaolan Zhang,Nathan C.Skalsky5.Trail of Bytes:Efficient Support for Forensic Analysis.Srinivas Krishnan,Kevin Z.Snow,Fabian Monrose6.Survivable Key Compromise in Software Update Systems.Justin Samuel,Nick Mathewson,Justin Cappos,Roger Dingledine7.A Methodology for Empirical Analysis of the Permission-Based Security Models and its Application to Android.David Barrera,H.Gunes Kayacik,Paul C.van Oorschot,Anil Somayaji8.Mobile Location Tracking in Metropolitan Areas:malnets and others.Nathanial Husted,Steve Myers9.On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels:The Case of Acoustic Eavesdropping.Tzipora Halevi,Nitesh Saxena10.PinDr0p:Using Single-Ended Audio Features to Determine Call Provenance.Vijay A.Balasubramaniyan,Aamir Poonawalla,Mustaque Ahamad,Michael T.Hunter,Patrick Traynor11.Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes.Sanjam Garg,Abishek Kumarasubramanian,Amit Sahai,Brent Waters12.Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade.Dan Boneh,Hart Montgomery,Ananth Raghunathan13.Practical Leakage-Resilient Pseudorandom Generators.Yu Yu,Francois-Xavier Standaert,Olivier Pereira,Moti Yung14.Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions.Sherman S.M.Chow,Yevgeniy Dodis,Yannis Rouselakis,Brent Waters15.Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords.Matt Weir,Sudhir Aggarwal,Michael Collins,Henry Stern16.The Security of Modern Password Expiration:An Algorithmic Framework and Empirical Analysis.Yinqian Zhang,Fabian Monrose,Michael K.Reiter17.Attacks and Design of Image Recognition CAPTCHAs.Bin Zhu,JeffYan,Chao Yang,Qiujie Li,Jiu Liu,Ning Xu,Meng Yi18.Robusta:Taming the Native Beast of the JVM.Joseph Siefers,Gang Tan,Greg Morrisett19.Retaining Sandbox Containment Despite Bugs in Privileged Memory-Safe Code.Justin Cappos,Armon Dadgar,JeffRasley,Justin Samuel,Ivan Beschastnikh,Cosmin Barsan,Arvind Krishnamurthy,Thomas Anderson20.A Control Point for Reducing Root Abuse of File-System Privileges.Glenn Wurster,Paul C.van Oorschot21.Modeling Attacks on Physical Unclonable Functions.Ulrich Ruehrmair,Frank Sehnke,Jan Soelter,Gideon Dror,Srinivas Devadas,Juergen Schmidhuber22.Dismantling SecureMemory,CryptoMemory and CryptoRF.Flavio D.Garcia,Peter van Rossum,Roel Verdult,Ronny Wichers Schreur23.Attacking and Fixing PKCS#11Security Tokens.Matteo Bortolozzo,Matteo Centenaro,Riccardo Focardi,Graham Steel24.An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications.Dongseok Jang,Ranjit Jhala,Sorin Lerner,Hovav Shacham25.DIFC Programs by Automatic Instrumentation.William Harris,Somesh Jha,Thomas Reps26.Predictive Black-box Mitigation of Timing Channels.Aslan Askarov,Danfeng Zhang,Andrew Myers27.In Search of an Anonymous and Secure Lookup:Attacks on Structured Peer-to-peer Anonymous Communication Systems.Qiyan Wang,Prateek Mittal,Nikita Borisov28.Recruiting New Tor Relays with BRAIDS.Rob Jansen,Nicholas Hopper,Yongdae Kim29.An Improved Algorithm for Tor Circuit Scheduling.Can Tang,Ian Goldberg30.Dissent:Accountable Anonymous Group Messaging.Henry Corrigan-Gibbs,Bryan Ford31.Abstraction by Set-Membership—Verifying Security Protocols and Web Services with Databases.Sebastian Moedersheim。

指导老师舒炎泰教授

指导老师舒炎泰教授
between channels Fast switch from
Mobility (potentially high-speed)
Link adaptation Variable
transmission power Multiple channels Link quality feedback
考虑开发具有TDMA或CDMA的分布和协作的MAC协议的复杂性和成本; 是具有现有MAC协议的TDMA(或CDMA)MAC的兼容性。如在802.16中,
原来的MAC协议是一个集中的TDMA方案, 但对于802.16 mesh,一个 分布式的TDMA MAC仍然是空缺。在802.11WMNs中,如何设计一个覆盖 CSMA/CA的分布式的TDMA MAC协议是一个有趣但具有挑战的问题。
要大量的研究努力; 虽然已经建议的Adaptive/smart天线等的多天线系统,以及MIMO系
统能增加容量和减轻由于衰退、通道干扰引起的损害,但对WMNs 而言,开发这种技术是一个更具挑战的问题; 为了更好的利用物理层提供的先进技术,尤其MAC层协议需要和 物理层交互的工作。因此,设计物理层的一些组件时,应使高层能 访问或控制它们。这就使得硬件的设计更具挑战性,同时,也触发低 成本软件radio技术的创新。
Tianjin University
Computer Department
Design Approaches of a Single-channel MAC protocol
Modifying Existing MAC Protocols
例如,在一个802.11 mesh网中, MAC层协议可以通过调整CSMA/CA的参 数得到改善(如CW的大小,修改backoff程序)。但该方法仅能实现低的 端到端的吞吐率,因为它不能大量的减少邻居节点间竞争的概率。
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

3062IEEETRANSACTIONSONINFORMATIONTHEORY,VOL.50,NO.12,DECEMBER2004CooperativeDiversityinWirelessNetworks:EfficientProtocolsandOutageBehavior

J.NicholasLaneman,Member,IEEE,DavidN.C.Tse,Member,IEEE,andGregoryW.Wornell,Fellow,IEEE

Abstract—Wedevelopandanalyzelow-complexitycooperativediversityprotocolsthatcombatfadinginducedbymultipathpropagationinwirelessnetworks.Theunderlyingtechniquesexploitspacediversityavailablethroughcooperatingterminals’relayingsignalsforoneanother.Weoutlineseveralstrategiesemployedbythecooperatingradios,includingfixedrelayingschemessuchasamplify-and-forwardanddecode-and-forward,selectionrelayingschemesthatadaptbaseduponchannelmea-surementsbetweenthecooperatingterminals,andincrementalrelayingschemesthatadaptbaseduponlimitedfeedbackfromthedestinationterminal.Wedevelopperformancecharacterizationsintermsofoutageeventsandassociatedoutageprobabilities,whichmeasurerobustnessofthetransmissionstofading,focusingonthehighsignal-to-noiseratio(SNR)regime.Exceptforfixeddecode-and-forward,allofourcooperativediversityprotocolsareefficientinthesensethattheyachievefulldiversity(i.e.,second-orderdiversityinthecaseoftwoterminals),and,more-over,areclosetooptimum(within1.5dB)incertainregimes.Thus,usingdistributedantennas,wecanprovidethepowerfulbenefitsofspacediversitywithoutneedforphysicalarrays,thoughatalossofspectralefficiencyduetohalf-duplexoperationandpossiblyatthecostofadditionalreceivehardware.Applicabletoanywirelesssetting,includingcellularoradhocnetworks—whereverspaceconstraintsprecludetheuseofphysicalarrays—theperformancecharacterizationsrevealthatlargepowerorenergysavingsresultfromtheuseoftheseprotocols.

IndexTerms—Diversitytechniques,fadingchannels,outageprobability,relaychannel,usercooperation,wirelessnetworks.

I.INTRODUCTION

INwirelessnetworks,signalfadingarisingfrommultipath

propagationisaparticularlyseverechannelimpairmentthatcanbemitigatedthroughtheuseofdiversity[1].Space,ormul-

ManuscriptreceivedJanuary22,2002;revisedJune10,2004.TheworkofJ.N.LanemanandG.W.WornellwassupportedinpartbyARLFederatedLabsunderCooperativeAgreementDAAD19-01-2-0011,andbytheNationalScienceFoundationunderGrantCCR-9979363.TheworkofJ.N.LanemanwasalsosupportedinpartbytheStateofIndianathroughthe21stCenturyRe-searchandTechnologyFund,andbytheNationalScienceFoundationunderGrantECS03-29766.TheworkofD.N.C.TsewassupportedinpartbytheNationalScienceFoundationunderGrantANI-9872764.Thematerialinthispaperwaspresentedinpartatthe38thAnnualAllertonConferenceonCom-munications,ControlandComputing,Monticello,IL,October2000,andattheIEEEInternationalSymposiumonInformationTheory,Washington,DC,June2001.J.N.LanemanwaswiththeDepartmentofElectricalEngineeringandCom-puterScience,MassachusettsInstituteofTechnology(MIT),Cambridge.HeisnowwiththeDepartmentofElectricalEngineering,UniversityofNotreDame,NotreDame,IN46556USA(e-mail:jnl@nd.edu).D.N.C.TseiswiththeDepartmentofElectricalEngineeringandCom-puterScience,UniversityofCalifornia,Berkeley,CA94720USA(e-mail:dtse@eecs.berkeley.edu).G.W.WornelliswiththeDepartmentofElectricalEngineeringandComputerScience,MassachusettsInstituteofTechnology(MIT),Cambridge,MA02139USA(e-mail:gww@mit.edu).CommunicatedbyL.Tassiulas,AssociateEditorforCommunicationNet-works.DigitalObjectIdentifier10.1109/TIT.2004.838089

Fig.1.IllustrationofradiosignalpathsinanexamplewirelessnetworkwithterminalsTandTtransmittinginformationtoterminalsTandT,respectively.

tiple-antenna,diversitytechniquesareparticularlyattractiveastheycanbereadilycombinedwithotherformsofdiversity,e.g.,timeandfrequencydiversity,andstillofferdramaticperfor-mancegainswhenotherformsofdiversityareunavailable.Incontrasttothemoreconventionalformsofspacediversitywithphysicalarrays[2]–[4],thisworkbuildsupontheclassicalrelaychannelmodel[5]andexaminestheproblemofcreatingandexploitingspacediversityusingacollectionofdistributedan-tennasbelongingtomultipleterminals,eachwithitsownin-formationtotransmit.Werefertothisformofspacediversityascooperativediversity(cf.,usercooperationdiversityof[6])becausetheterminalssharetheirantennasandotherresourcestocreatea“virtualarray”throughdistributedtransmissionandsignalprocessing.

A.MotivatingExampleToillustratethemainconcepts,considertheexamplewire-lessnetworkinFig.1,inwhichterminalsandtransmit

toterminalsand,respectively.Thisexamplemightcor-respondtoasnapshotofawirelessnetworkinwhichahigherlevelnetworkprotocolhasallocatedbandwidthtotwoterminalsfortransmissiontotheirintendeddestinationsornexthops.Forexample,inthecontextofacellularnetwork,andmightcorrespondtohandsetsandmightcorrespondtothebasestation[7].Asanotherexample,inthecontextofawire-lesslocal-areanetwork(LAN),thecasemightcorre-spondtoanadhocconfigurationamongtheterminals,whilethecasemightcorrespondtoaninfrastructureconfigura-tion,withservingasanaccesspoint[8].Thebroadcastna-tureofthewirelessmediumisthekeypropertythatallowsforcooperativediversityamongthetransmittingterminals:trans-mittedsignalscan,inprinciple,bereceivedandprocessedbyanyofanumberofterminals.Thus,insteadoftransmittingin-dependentlytotheirintendeddestinations,andcanlistentoeachother’stransmissionsandjointlycommunicatetheirin-formation.Althoughtheseextraobservationsofthetransmittedsignalsareavailableforfree(except,possibly,forthecostof

相关文档
最新文档