Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60212-5
Yang HU, Hong-zi FU, Xiu-lao TIAN
The tensor representation of quantum teleportation shows the internal connection between Bell basis measurement matrix Tα and channel parameter matrix (CPM) R. An explicit CPM criterion based on the tensor representation is derived. This criterion can be used to judge whether a quantum state can be employed as the quantum channel or not in teleportation and bidirectional teleportation, and it provides us more flexible choices to construct the quantum channel.
{"title":"Efficient methods for choosing quantum channel in teleportation and bidirectional teleportation","authors":"Yang HU, Hong-zi FU, Xiu-lao TIAN","doi":"10.1016/S1005-8885(13)60212-5","DOIUrl":"10.1016/S1005-8885(13)60212-5","url":null,"abstract":"<div><p>The tensor representation of quantum teleportation shows the internal connection between Bell basis measurement matrix <em>T<sup>α</sup></em> and channel parameter matrix (CPM) <strong><em>R</em></strong>. An explicit CPM criterion based on the tensor representation is derived. This criterion can be used to judge whether a quantum state can be employed as the quantum channel or not in teleportation and bidirectional teleportation, and it provides us more flexible choices to construct the quantum channel.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 101-104"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60212-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81292289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60219-8
Kai KANG , Zhi-bo PANG , Cong WANG
The rapid development of technologies towards Internet of Things (IoT), has led to new circumstances at all levels of the social environment. In healthcare in particular, the use of IoT concepts and technologies make diagnose and monitor more convenient for the physicians and patients. As mobile applications solutions are widely accepted because the easy to use, secure healthcare service is a new demand for mobile solutions. To protect the privacy and security for patients in the domain of healthcare towards IoT, a systematic mechanism is needed. This article proposes a novel security and privacy mechanism for Health Internet of Things (Health-IoT) to solve above problems. Health-IoT is promising for both traditional healthcare industry and the information and communication technologies (ICTs) industry. From the view of trustworthiness, interactive vector was proposed to communicate the end-devices and application brokers. The aim is to establish a trust IoT application market (IAM), feature of application in marketplace and behavior of applications on end-devices can be exchanged in mathematical value to establish the connection between market and users.
{"title":"Security and privacy mechanism for health internet of things","authors":"Kai KANG , Zhi-bo PANG , Cong WANG","doi":"10.1016/S1005-8885(13)60219-8","DOIUrl":"10.1016/S1005-8885(13)60219-8","url":null,"abstract":"<div><p>The rapid development of technologies towards Internet of Things (IoT), has led to new circumstances at all levels of the social environment. In healthcare in particular, the use of IoT concepts and technologies make diagnose and monitor more convenient for the physicians and patients. As mobile applications solutions are widely accepted because the easy to use, secure healthcare service is a new demand for mobile solutions. To protect the privacy and security for patients in the domain of healthcare towards IoT, a systematic mechanism is needed. This article proposes a novel security and privacy mechanism for Health Internet of Things (Health-IoT) to solve above problems. Health-IoT is promising for both traditional healthcare industry and the information and communication technologies (ICTs) industry. From the view of trustworthiness, interactive vector was proposed to communicate the end-devices and application brokers. The aim is to establish a trust IoT application market (IAM), feature of application in marketplace and behavior of applications on end-devices can be exchanged in mathematical value to establish the connection between market and users.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 64-68"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60219-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87025185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60216-2
Li WANG , Jing-wei MO , Yue MA , Peng LU
Cooperation among heterogeneous base stations can improve spectrum efficiency through interference avoidance. This paper introduces a time reversal (TR) technique in multi-cell cooperation to mitigate interference and efficiently allocate spectrum resources. Exploiting its inherent power concentration feature, TR can effectively tackle the problem of edge effect. We present analysis and simulation results to demonstrate that proper use of TR significantly improves the spectrum efficiency of heterogeneous networks.
{"title":"Multi-cell cooperation based on time reversal in heterogeneous wireless networks","authors":"Li WANG , Jing-wei MO , Yue MA , Peng LU","doi":"10.1016/S1005-8885(13)60216-2","DOIUrl":"10.1016/S1005-8885(13)60216-2","url":null,"abstract":"<div><p>Cooperation among heterogeneous base stations can improve spectrum efficiency through interference avoidance. This paper introduces a time reversal (TR) technique in multi-cell cooperation to mitigate interference and efficiently allocate spectrum resources. Exploiting its inherent power concentration feature, TR can effectively tackle the problem of edge effect. We present analysis and simulation results to demonstrate that proper use of TR significantly improves the spectrum efficiency of heterogeneous networks.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 80-85"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60216-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85374872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60217-4
Ying WANG , Li-ze GU , Zhong-xian LI , Yi-xian YANG
This paper presents a new method for protocol reverse engineering, which combines both the dynamic and static binary analysis. Our work not only does precise positioning on the field and its length, but also gives the field attributes accurately. According to different instructions and the current program structure, we can infer the message format validly. To prove the method is sound and effective, we build a prototype tool – NetProtocolFinder, and select some documented protocol and undocumented protocol messages as the test instances respectively. Results of our experiments show that the tool can not only extract the message format from protocols effectively, but also speculate the state machine model through relevant field attributes conveniently.
{"title":"Protocol reverse engineering through dynamic and static binary analysis","authors":"Ying WANG , Li-ze GU , Zhong-xian LI , Yi-xian YANG","doi":"10.1016/S1005-8885(13)60217-4","DOIUrl":"10.1016/S1005-8885(13)60217-4","url":null,"abstract":"<div><p>This paper presents a new method for protocol reverse engineering, which combines both the dynamic and static binary analysis. Our work not only does precise positioning on the field and its length, but also gives the field attributes accurately. According to different instructions and the current program structure, we can infer the message format validly. To prove the method is sound and effective, we build a prototype tool – NetProtocolFinder, and select some documented protocol and undocumented protocol messages as the test instances respectively. Results of our experiments show that the tool can not only extract the message format from protocols effectively, but also speculate the state machine model through relevant field attributes conveniently.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 75-79"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60217-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84189253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60208-3
Bo LI, Zi-chen CHEN, Hai-bo QIU, Xiao-qiang XI
Measure synchronization (MS) is a novel phenomenon which can be found in some coupled Hamiltonian systems (HS). In this paper, we built a new model called two coupled phase oscillators system (CPOS), and found that, under the appropriate initial conditions, it will meet a critical phenomenon in the phase space as the coupling strength increases. We also found the critical state by introducing the Poincaré section technique. We established a new formula for the critical coupling strength by analyzing the HS model, and extended this formula to the CPOS. The numerically analytical results show the reason why the measure synchronization of CPOS does not exist.
{"title":"Critical phenomenon of two coupled phase oscillators","authors":"Bo LI, Zi-chen CHEN, Hai-bo QIU, Xiao-qiang XI","doi":"10.1016/S1005-8885(13)60208-3","DOIUrl":"10.1016/S1005-8885(13)60208-3","url":null,"abstract":"<div><p>Measure synchronization (MS) is a novel phenomenon which can be found in some coupled Hamiltonian systems (HS). In this paper, we built a new model called two coupled phase oscillators system (CPOS), and found that, under the appropriate initial conditions, it will meet a critical phenomenon in the phase space as the coupling strength increases. We also found the critical state by introducing the Poincaré section technique. We established a new formula for the critical coupling strength by analyzing the HS model, and extended this formula to the CPOS. The numerically analytical results show the reason why the measure synchronization of CPOS does not exist.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 121-127"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60208-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82937785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60221-6
Xiao-ming LIU , Qi LI
This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.
{"title":"On a novel method of designing distributed LDoS attack based on network behavior features","authors":"Xiao-ming LIU , Qi LI","doi":"10.1016/S1005-8885(13)60221-6","DOIUrl":"10.1016/S1005-8885(13)60221-6","url":null,"abstract":"<div><p>This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 54-59"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60221-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83191698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60220-4
Ji-zheng GUAN , Ming-tao LEI , Xiao-lu ZHU , Jian-yi LIU
It is an important function for managers to keep away from information security risks. With the increasing complex and scale of information systems, information system security risks may be more difficult to assess and strategies for risk reduction may be lack of objectivity. To solve this problem, this paper proposes a knowledge-based information security risk assessment method in which basic rules and specific rules are defined to match every asset, threat and vulnerability. Basic rules are defined as the rules without influence of external relationships. Specific rules are defined as the rules by user group. Performance analysis shows this method could increase efficiency and ensure accuracy of risk assessment.
{"title":"Knowledge-based information security risk assessment method","authors":"Ji-zheng GUAN , Ming-tao LEI , Xiao-lu ZHU , Jian-yi LIU","doi":"10.1016/S1005-8885(13)60220-4","DOIUrl":"10.1016/S1005-8885(13)60220-4","url":null,"abstract":"<div><p>It is an important function for managers to keep away from information security risks. With the increasing complex and scale of information systems, information system security risks may be more difficult to assess and strategies for risk reduction may be lack of objectivity. To solve this problem, this paper proposes a knowledge-based information security risk assessment method in which basic rules and specific rules are defined to match every asset, threat and vulnerability. Basic rules are defined as the rules without influence of external relationships. Specific rules are defined as the rules by user group. Performance analysis shows this method could increase efficiency and ensure accuracy of risk assessment.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 60-63"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60220-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90473109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rural medical and health collaborative working platform is a collaborative platform which combines information processing system, office management, and telemedicine and computer aided diagnosis system. The personal health records, expert information, fund management information, and any others on the rural medical and health collaborative working platform are user's privacy data, which need strong security protection. In order to achieve efficient data sharing between doctors and patients and ensure the data security, there must be strict access control policy to be applied on the rural medical and health collaborative working platform. In this paper, the access control and its application on the rural medical and health collaborative working platform are discussed from the perspective of user role management.
{"title":"Access control for rural medical and health collaborative working platform","authors":"Yan-feng JIANG , Si-yue ZHANG , Zhen HUANG , Mu-qing LIU , Ling YIN , Jing-ping NIU","doi":"10.1016/S1005-8885(13)60229-0","DOIUrl":"10.1016/S1005-8885(13)60229-0","url":null,"abstract":"<div><p>Rural medical and health collaborative working platform is a collaborative platform which combines information processing system, office management, and telemedicine and computer aided diagnosis system. The personal health records, expert information, fund management information, and any others on the rural medical and health collaborative working platform are user's privacy data, which need strong security protection. In order to achieve efficient data sharing between doctors and patients and ensure the data security, there must be strict access control policy to be applied on the rural medical and health collaborative working platform. In this paper, the access control and its application on the rural medical and health collaborative working platform are discussed from the perspective of user role management.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 7-10"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60229-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84955088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60215-0
Xiao-shi SONG, Chang-chuan YIN, Dan-pu LIU, Jian-feng LI
This paper characterizes the spatially-normalized degrees of freedom (DoF) of a 2-cell, 3-user per cell multiple input multiple output (MIMO) cellular networks with M antennas at each user and N antennas at each base station. We show that the spatially-normalized DoF is a piecewise linear function, with either M or N being the bottleneck. Given γ = M / N, we shown that for there is redundancy in both M and N, i.e., either can be reduced without losing spatially-normalized DoF. On the other hand, for it is shown that there is no redundancy in either M or N, i.e, neither can be reduced without losing spatially-normalized DoF. Our results also settle the issue of feasibility of linear interference alignment for all values of M and N. Specifically, it is shown that except for for every other γ, the proper systems are actually not feasible.
本文描述了一个2小区,每小区3个用户的多输入多输出(MIMO)蜂窝网络的空间归一化自由度(DoF),每个用户有M个天线,每个基站有N个天线。我们证明了空间归一化自由度是一个分段线性函数,其中M或N是瓶颈。在给定γ = M / N的情况下,我们证明了在M和N中都存在冗余,即可以在不丢失空间归一化自由度的情况下减小任意一个。另一方面,由于M和N都不存在冗余,即在不损失空间归一化自由度的情况下,都不能进行约简。我们的结果也解决了所有M和n值的线性干涉对准的可行性问题。具体来说,它表明,除了每一个其他γ,适当的系统实际上是不可行的。
{"title":"Interference alignment and spatially-normalized degrees of freedom of cellular networks with two cells and three users per cell","authors":"Xiao-shi SONG, Chang-chuan YIN, Dan-pu LIU, Jian-feng LI","doi":"10.1016/S1005-8885(13)60215-0","DOIUrl":"10.1016/S1005-8885(13)60215-0","url":null,"abstract":"<div><p>This paper characterizes the spatially-normalized degrees of freedom (DoF) of a 2-cell, 3-user per cell multiple input multiple output (MIMO) cellular networks with <em>M</em> antennas at each user and <em>N</em> antennas at each base station. We show that the spatially-normalized DoF is a piecewise linear function, with either <em>M</em> or <em>N</em> being the bottleneck. Given γ = M / N, we shown that for <figure><img></figure> there is redundancy in both <em>M</em> and <em>N</em>, i.e., either can be reduced without losing spatially-normalized DoF. On the other hand, for <figure><img></figure> it is shown that there is no redundancy in either <em>M</em> or <em>N</em>, i.e, neither can be reduced without losing spatially-normalized DoF. Our results also settle the issue of feasibility of linear interference alignment for all values of <em>M</em> and <em>N</em>. Specifically, it is shown that except for <figure><img></figure> for every other γ, the proper systems are actually not feasible.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 86-91"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60215-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86381834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1016/S1005-8885(13)60206-X
Jia-min GONG , Yun ZHAO , Xu ZUO
A gain-flattened tellurite-based fiber Raman amplifiers (T-FRA) is proposed and numerically demonstrated. By solving the steady equation of a T-FRA, the characteristics including the gain and gain flatness of T-FRA is investigated. The results show that a T-FRA pumped by dual wavelengths can provide gain-flattened band with widths of 48 nm. Moreover, the average gain and gain flatness is 17.72 dB and 0.68 dB, respectively. The newly designed T-FRA is very promising in future optical fiber communication systems.
{"title":"Gain-flattened tellurite-based fiber Raman amplifiers","authors":"Jia-min GONG , Yun ZHAO , Xu ZUO","doi":"10.1016/S1005-8885(13)60206-X","DOIUrl":"10.1016/S1005-8885(13)60206-X","url":null,"abstract":"<div><p>A gain-flattened tellurite-based fiber Raman amplifiers (T-FRA) is proposed and numerically demonstrated. By solving the steady equation of a T-FRA, the characteristics including the gain and gain flatness of T-FRA is investigated. The results show that a T-FRA pumped by dual wavelengths can provide gain-flattened band with widths of 48 nm. Moreover, the average gain and gain flatness is 17.72 dB and 0.68 dB, respectively. The newly designed T-FRA is very promising in future optical fiber communication systems.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 143-146"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60206-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83861002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}