Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449215
R. Yang, Junxing Zhang
To support next-generation services, IoT architectures are increasingly adopting emerging technologies to achieve the interconnection of everything, such as software-defined networking (SDN) and network function virtualization (NFV). From a developer's perspective, wireless access is the core technology of the IoT device side. Although the testbed is an important research tool for experimental evaluation in this environment, the pattern of the Internet of Things testbed is fragmented. And testing new applications and network protocols in IoT systems is a difficult and time-consuming task. In this work, we aim to fill this gap by proposing imuLab (a simulation experiment platform for the Internet of Things). ImuLab bridges the functions of the existing emulator of the Internet of Things (ie VMNet), and combines OpenStack and container technology to evaluate and verify the research ideas about the IoT network protocol. Our research aims to build a test platform with scalability, portability, high reliability, and flexible deployment of multiple experimental solutions at a reasonable cost. The experimental results show that imuLab shows relatively good performance under limited resources.
{"title":"imuLab: Internet of Things Simulation Platform Based on OpenStack and Container Technology","authors":"R. Yang, Junxing Zhang","doi":"10.1109/ICCCS52626.2021.9449215","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449215","url":null,"abstract":"To support next-generation services, IoT architectures are increasingly adopting emerging technologies to achieve the interconnection of everything, such as software-defined networking (SDN) and network function virtualization (NFV). From a developer's perspective, wireless access is the core technology of the IoT device side. Although the testbed is an important research tool for experimental evaluation in this environment, the pattern of the Internet of Things testbed is fragmented. And testing new applications and network protocols in IoT systems is a difficult and time-consuming task. In this work, we aim to fill this gap by proposing imuLab (a simulation experiment platform for the Internet of Things). ImuLab bridges the functions of the existing emulator of the Internet of Things (ie VMNet), and combines OpenStack and container technology to evaluate and verify the research ideas about the IoT network protocol. Our research aims to build a test platform with scalability, portability, high reliability, and flexible deployment of multiple experimental solutions at a reasonable cost. The experimental results show that imuLab shows relatively good performance under limited resources.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449208
Jun Xiong, Bin Yu
The existing ZigBee network secure communication protocols suffer from security defects and are not suitable for large-scale ZigBee mesh network. To handle the problems, this paper proposes a novel secure communication scheme for ZigBee mesh network based on physical unclonable function (PUF). Through the combination of certificateless public key cryptography (CL-PKC) on elliptic curve (EC) with PUF, the ZigBee devices in the proposed scheme do not need to store secret parameters. Besides, since the proposed scheme realizes mutual identity authentication and session key agreement without using bilinear pairing operations with high computational complexity, communication security of the scheme is ensured with low computation, storage, and communication overhead. It is proved that the proposed scheme can resist traditional external attacks such as replay attacks, man-in-the-middle attacks, and impersonation attacks, as well as physical attacks and replication attacks. The performance analysis results show that the proposed scheme has obvious advantages in security, communication overhead, and computation overhead, when compared with the existing benchmark methods.
{"title":"A Novel Secure Communication Scheme for ZigBee Mesh Network Based on Physical Unclonable Function","authors":"Jun Xiong, Bin Yu","doi":"10.1109/ICCCS52626.2021.9449208","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449208","url":null,"abstract":"The existing ZigBee network secure communication protocols suffer from security defects and are not suitable for large-scale ZigBee mesh network. To handle the problems, this paper proposes a novel secure communication scheme for ZigBee mesh network based on physical unclonable function (PUF). Through the combination of certificateless public key cryptography (CL-PKC) on elliptic curve (EC) with PUF, the ZigBee devices in the proposed scheme do not need to store secret parameters. Besides, since the proposed scheme realizes mutual identity authentication and session key agreement without using bilinear pairing operations with high computational complexity, communication security of the scheme is ensured with low computation, storage, and communication overhead. It is proved that the proposed scheme can resist traditional external attacks such as replay attacks, man-in-the-middle attacks, and impersonation attacks, as well as physical attacks and replication attacks. The performance analysis results show that the proposed scheme has obvious advantages in security, communication overhead, and computation overhead, when compared with the existing benchmark methods.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133103644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of low accuracy of population counting in existing algorithms, we propose a density estimation algorithm combining attention mechanism and dilated convolution. In this paper, the basic framework of feature extraction consists of part of the network layer of VGG-16 and attention mechanism. Then, replace part of the pooling layer and fully connected layer of the original network with a zigzag dilation convolution module to effectively compensate for the information loss caused by the pooling layer. Specially, the ability of the network model to extract features is improved by fusing the feature information of the high and low layers, thereby improving the counting performance of the model. We compare our method with the other state-of-the-art works, and the experiment results demonstrate the superiority of our method, which shows that the proposed method has high accuracy, strong adaptability and robustness, and can well adapt to the detection of people of different densities.
{"title":"Research on Crowd Counting Based on Attention Mechanism and Dilation Convolution","authors":"Pingping Li, Hongmin Zhang, Xiaobing Fang, Shunyuan Li, Hao Zhou, Xu Zhuang","doi":"10.1109/ICCCS52626.2021.9449170","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449170","url":null,"abstract":"Aiming at the problem of low accuracy of population counting in existing algorithms, we propose a density estimation algorithm combining attention mechanism and dilated convolution. In this paper, the basic framework of feature extraction consists of part of the network layer of VGG-16 and attention mechanism. Then, replace part of the pooling layer and fully connected layer of the original network with a zigzag dilation convolution module to effectively compensate for the information loss caused by the pooling layer. Specially, the ability of the network model to extract features is improved by fusing the feature information of the high and low layers, thereby improving the counting performance of the model. We compare our method with the other state-of-the-art works, and the experiment results demonstrate the superiority of our method, which shows that the proposed method has high accuracy, strong adaptability and robustness, and can well adapt to the detection of people of different densities.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"50 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449294
Jiali Tu, Shanlin Qin, Rongliang Chen
Aortic dissection is the separation of the inner layers of the aortic wall, which allows the blood to flow into it. The computational fluid dynamics allows a better understanding of its pathology and treatment. However, it is time-consuming due to the computationally expensive. In this work, we introduce a parallel algorithm for accurate and fast three-dimensional blood flow simulation of a patient-specific full-size aorta with dissections. Specifically, the unsteady Navier-Stokes equations are discretized by a unstructured finite element method in space and a fully implicit finite difference method in time, and the fully coupled nonlinear system at each time step is solved by a domain decomposition method based parallel scalable iterative algorithm. The numerical results are carefully analyzed and it shows that the simulated pressure, velocity, and wall shear stress are within a reasonable range. In addition, the algorithm achieves a parallel efficiency of 40% when using 3840 processor cores on the Tianhe-2A supercomputer, which shows the potential to do fast and high fidelity blood flow simulations of aortic dissection.
{"title":"Parallel Numerical Simulation of Blood Flows in Patient-specific Aortic Dissection","authors":"Jiali Tu, Shanlin Qin, Rongliang Chen","doi":"10.1109/ICCCS52626.2021.9449294","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449294","url":null,"abstract":"Aortic dissection is the separation of the inner layers of the aortic wall, which allows the blood to flow into it. The computational fluid dynamics allows a better understanding of its pathology and treatment. However, it is time-consuming due to the computationally expensive. In this work, we introduce a parallel algorithm for accurate and fast three-dimensional blood flow simulation of a patient-specific full-size aorta with dissections. Specifically, the unsteady Navier-Stokes equations are discretized by a unstructured finite element method in space and a fully implicit finite difference method in time, and the fully coupled nonlinear system at each time step is solved by a domain decomposition method based parallel scalable iterative algorithm. The numerical results are carefully analyzed and it shows that the simulated pressure, velocity, and wall shear stress are within a reasonable range. In addition, the algorithm achieves a parallel efficiency of 40% when using 3840 processor cores on the Tianhe-2A supercomputer, which shows the potential to do fast and high fidelity blood flow simulations of aortic dissection.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"12373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The SAR image and the multispectral image are both used for dynamic monitoring, mineral resources investigation, urban and rural monitoring and evaluation, traffic network exploration, forest resources investigation, desertification monitoring, and so on. The multi-spectral and SAR image fusion to improve the classify quality is discussed in this paper, compared the common fusion algorithms of the SAR image and multi spectral images, that is standard color transform (Brovey) method, phase recovery (Gram-Schmidt) method and color space transform (HSV) method, principal component transformation super resolution (PCA) method and Bias method (Pansharp), by which the fused image is more relative with the multi-spectral and SAR.
{"title":"Analysis of the Multispectral and SAR Image","authors":"Shuchun Zhang, Yun Zhang, Yongbin Chou, Ziheng Wang, Yifu Shi, Zhenyu Sun","doi":"10.1109/ICCCS52626.2021.9449213","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449213","url":null,"abstract":"The SAR image and the multispectral image are both used for dynamic monitoring, mineral resources investigation, urban and rural monitoring and evaluation, traffic network exploration, forest resources investigation, desertification monitoring, and so on. The multi-spectral and SAR image fusion to improve the classify quality is discussed in this paper, compared the common fusion algorithms of the SAR image and multi spectral images, that is standard color transform (Brovey) method, phase recovery (Gram-Schmidt) method and color space transform (HSV) method, principal component transformation super resolution (PCA) method and Bias method (Pansharp), by which the fused image is more relative with the multi-spectral and SAR.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124583125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449148
Chaocun Zhang, Zhe Zheng
Millimeter-wave technology is widely used in many fields. Due to its short wavelength and strong penetration, millimeter-wave technology has been rapidly developed in the field of radar imaging. This paper designs a millimeter-wave radar system for two-dimensional high-resolution imaging of scattering points in the near-field range. A millimeter-wave SAR imaging system was designed, and the applicability of the modified back-projection algorithm was verified through system simulation. The darkroom test result shows that the imaging system can synthesize a short aperture using the uniform linear motion of the platform, and perform high-resolution two-dimensional imaging of the scattering points in the near-field range. The imaging effect is good.
{"title":"Design and Research of near-Field and High-Dynamic Millimeter-Wave SAR Imaging System","authors":"Chaocun Zhang, Zhe Zheng","doi":"10.1109/ICCCS52626.2021.9449148","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449148","url":null,"abstract":"Millimeter-wave technology is widely used in many fields. Due to its short wavelength and strong penetration, millimeter-wave technology has been rapidly developed in the field of radar imaging. This paper designs a millimeter-wave radar system for two-dimensional high-resolution imaging of scattering points in the near-field range. A millimeter-wave SAR imaging system was designed, and the applicability of the modified back-projection algorithm was verified through system simulation. The darkroom test result shows that the imaging system can synthesize a short aperture using the uniform linear motion of the platform, and perform high-resolution two-dimensional imaging of the scattering points in the near-field range. The imaging effect is good.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133758809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449241
Lei Zhang, Binbin Wang, Quanjiang Shen, Yan Song, Naiwang Guo, Liangjun Xie
The number of mobile-end businesses in power industry has surged drastically in recent years, rendering increasing demands for penetration tests over these mobile applications. On the other hand, with the raising awareness of information security, most of the applications are traffic-encrypted, which significantly reduce the efficiency during penetration test since additional decryption and re-encryption steps are required before and after forwarding test data. In order to improve the efficiency, this paper proposes a man-in-the-middle-based three-layer proxy mode to achieve automated switching between the encryption and decryption scripts. Experiment results show that the average testing duration is reduced by around 95% and can be further reduced if automated penetration test tools such as AppScan and sqlmap are utilized.
{"title":"A MITM Based Penetration Test Efficiency Improvement Approach for Traffic-Encrypted Mobile Applications of Power Industry","authors":"Lei Zhang, Binbin Wang, Quanjiang Shen, Yan Song, Naiwang Guo, Liangjun Xie","doi":"10.1109/ICCCS52626.2021.9449241","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449241","url":null,"abstract":"The number of mobile-end businesses in power industry has surged drastically in recent years, rendering increasing demands for penetration tests over these mobile applications. On the other hand, with the raising awareness of information security, most of the applications are traffic-encrypted, which significantly reduce the efficiency during penetration test since additional decryption and re-encryption steps are required before and after forwarding test data. In order to improve the efficiency, this paper proposes a man-in-the-middle-based three-layer proxy mode to achieve automated switching between the encryption and decryption scripts. Experiment results show that the average testing duration is reduced by around 95% and can be further reduced if automated penetration test tools such as AppScan and sqlmap are utilized.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449107
Anqin Luo, Zhimin Chen, Jianan Yuan, Xie Fan
With the development of distribution network, the amount of data and computation generated by network edge devices increases dramatically, which brings pressure on data storage, cloud computing and transmission bandwidth. The traditional cloud computing model is difficult to guarantee the real-time performance of data analysis, processing and response, which makes the non-real-time performance of information flow directly affect the stability of energy flow and the reliability of control. According to the requirements of real-time, data security and network bandwidth of active distribution network, this paper proposes a collaborative model of edge computing and cloud computing for active distribution network. Through the analysis of power consumption data, it is verified that the active distribution network based on edge computing can realize the local optimization of storage and processing data of edge nodes, improve the processing efficiency, ensure the real-time data analysis and processing.
{"title":"Analysis and Processing of Power Distribution Data Based on Edge Computing","authors":"Anqin Luo, Zhimin Chen, Jianan Yuan, Xie Fan","doi":"10.1109/ICCCS52626.2021.9449107","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449107","url":null,"abstract":"With the development of distribution network, the amount of data and computation generated by network edge devices increases dramatically, which brings pressure on data storage, cloud computing and transmission bandwidth. The traditional cloud computing model is difficult to guarantee the real-time performance of data analysis, processing and response, which makes the non-real-time performance of information flow directly affect the stability of energy flow and the reliability of control. According to the requirements of real-time, data security and network bandwidth of active distribution network, this paper proposes a collaborative model of edge computing and cloud computing for active distribution network. Through the analysis of power consumption data, it is verified that the active distribution network based on edge computing can realize the local optimization of storage and processing data of edge nodes, improve the processing efficiency, ensure the real-time data analysis and processing.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449233
Juhyoung Kim, Eunseok Lee
As the scale of software increases, automated program repair (APR) is required as an essential technology to reduce bug-fixing manual effort. One of the most effective APR approaches is the template-based APR. Although this data- driven approach has made many improvements in fixing bugs, there is still a lack of information utilization at each stage of the program repair. In this paper, we propose a fix pattern prioritization APR technique. We do not just use the test cases to determine whether the source file is fault or not, but as a material for why the bug occurred. With this information, we select a more appropriate fix action and apply it first to increase the efficiency of the automated program repair.
{"title":"Fix Director for Automated Program Repair","authors":"Juhyoung Kim, Eunseok Lee","doi":"10.1109/ICCCS52626.2021.9449233","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449233","url":null,"abstract":"As the scale of software increases, automated program repair (APR) is required as an essential technology to reduce bug-fixing manual effort. One of the most effective APR approaches is the template-based APR. Although this data- driven approach has made many improvements in fixing bugs, there is still a lack of information utilization at each stage of the program repair. In this paper, we propose a fix pattern prioritization APR technique. We do not just use the test cases to determine whether the source file is fault or not, but as a material for why the bug occurred. With this information, we select a more appropriate fix action and apply it first to increase the efficiency of the automated program repair.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-23DOI: 10.1109/ICCCS52626.2021.9449128
Shuaihe Gao, Leyuan Sun, Lishu Guo, Yi Zhou
Long-term prediction accuracy of navigation satellite clocks determines the autonomous navigation service performance. The long-term predictability of the clock deviation is limited by the long-term frequency stability of the satellite-borne atomic clock. The new-generation navigation satellites are planned or have been equipped with inter-satellite links to achieve autonomous navigation. With the support of the inter-satellite link, this paper uses the relative clock deviation measurement of the inter-satellite network to generate a virtual composite clock whose long-term frequency stability is better than all satellite-borne atomic clocks. The virtual clock deviation is predicted for a long time. Combined the predicted virtual clock and the real time estimation of clock deviation from the Kalman filter, the long-term prediction value of the clock deviation of each satellite is obtained, thereby improving the accuracy of the long-term prediction of the satellite clock deviation. The simulation results show that the method in this paper can make the prediction accuracy of the satellite clock deviation better than 20 ns after 30 days, which can be improved by more than 90% compared with the conventional single satellite clock deviation prediction accuracy.
{"title":"Long-term Prediction Algorithm for Navigation Satellite Clocks Supported by Inter-satellite Links","authors":"Shuaihe Gao, Leyuan Sun, Lishu Guo, Yi Zhou","doi":"10.1109/ICCCS52626.2021.9449128","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449128","url":null,"abstract":"Long-term prediction accuracy of navigation satellite clocks determines the autonomous navigation service performance. The long-term predictability of the clock deviation is limited by the long-term frequency stability of the satellite-borne atomic clock. The new-generation navigation satellites are planned or have been equipped with inter-satellite links to achieve autonomous navigation. With the support of the inter-satellite link, this paper uses the relative clock deviation measurement of the inter-satellite network to generate a virtual composite clock whose long-term frequency stability is better than all satellite-borne atomic clocks. The virtual clock deviation is predicted for a long time. Combined the predicted virtual clock and the real time estimation of clock deviation from the Kalman filter, the long-term prediction value of the clock deviation of each satellite is obtained, thereby improving the accuracy of the long-term prediction of the satellite clock deviation. The simulation results show that the method in this paper can make the prediction accuracy of the satellite clock deviation better than 20 ns after 30 days, which can be improved by more than 90% compared with the conventional single satellite clock deviation prediction accuracy.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}