The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in...The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.展开更多
In a recent paper[J. Korean. Phys. Soc. 49 (2006) 459], two GHZ-state-based quantum secure direct communication protocols were presented. Here we point out that an eavesdropper can utilize a special property of GHZ ...In a recent paper[J. Korean. Phys. Soc. 49 (2006) 459], two GHZ-state-based quantum secure direct communication protocols were presented. Here we point out that an eavesdropper can utilize a special property of GHZ states, i.e. "correlation-elicitable" to obtain half information of the transmitted secrets without being detected in both protocols. The particular attack strategy is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocols secure against this kind of attack.展开更多
The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a suc...The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a successful man-in-the-middle attack,where he/she can obtain or even modify the transmitted secret without introducing any error.The particular attack strategy is demonstrated and an improved protocol is presented.展开更多
In 6G,artificial intelligence represented by deep nerual network(DNN)will unleash its potential and empower IoT applications to transform into intelligent IoT applications.However,whole DNNbased inference is difficult...In 6G,artificial intelligence represented by deep nerual network(DNN)will unleash its potential and empower IoT applications to transform into intelligent IoT applications.However,whole DNNbased inference is difficult to carry out on resourceconstrained intelligent IoT devices and will suffer privacy leakage when offloading to the cloud or mobile edge computation server(MECs).In this paper,we formulate a privacy and delay dual-driven device-edge collaborative inference(P4DE-CI)system to preserve the privacy of raw data while accelerating the intelligent inference process,where the intelligent IoT devices run the front-end part of DNN model and the MECs execute the back-end part of DNN model.Considering three typical privacy leakage models and the end-to-end delay of collaborative DNN-based inference,we define a novel intelligent inference Quality of service(I2-QoS)metric as the weighted summation of the inference latency and privacy preservation level.Moreover,we propose a DDPG-based joint DNN model optimization and resource allocation algorithm to maximize I2-QoS,by optimizing the association relationship between intelligent IoT devices and MECs,the DNN model placement decision,and the DNN model partition decision.Experiments carried out on the AlexNet model reveal that the proposed algorithm has better performance in both privacy-preserving and inference-acceleration.展开更多
The number of satellites,especially those operating in Low-Earth Orbit(LEO),has been exploding in recent years.Additionally,the burgeoning development of Artificial Intelligence(AI)software and hardware has opened up ...The number of satellites,especially those operating in Low-Earth Orbit(LEO),has been exploding in recent years.Additionally,the burgeoning development of Artificial Intelligence(AI)software and hardware has opened up new industrial opportunities in both air and space,with satellite-powered computing emerging as a new computing paradigm:Orbital Edge Computing(OEC).Compared to terrestrial edge computing,the mobility of LEO satellites and their limited communication,computation,and storage resources pose challenges in designing task-specific scheduling algorithms.Previous survey papers have largely focused on terrestrial edge computing or the integration of space and ground technologies,lacking a comprehensive summary of OEC architecture,algorithms,and case studies.This paper conducts a comprehensive survey and analysis of OEC's system architecture,applications,algorithms,and simulation tools,providing a solid background for researchers in the field.By discussing OEC use cases and the challenges faced,potential research directions for future OEC research are proposed.展开更多
The integration of emerging technologies such as artificial intelligence and cloud computing is accelerating the development of intelligent and autonomous satellite systems.However,limitations in onboard sensing,compu...The integration of emerging technologies such as artificial intelligence and cloud computing is accelerating the development of intelligent and autonomous satellite systems.However,limitations in onboard sensing,computing,storage,and energy resources continue to constrain the intelligent functionalities of individual satellites.Currently,most studies focus on either satellite intelligence or satellite networking,while systematic studies on their integration remain scarce.To address this gap,this paper introduces the concept of an intelligent satellite cluster system,which leverages satellite networks to enable collaborative intelligence among satellites,thereby enhancing the overall system intelligence.After summarizing the typical use cases of the intelligent satellite cluster system,we analyze the corresponding demands on network capabilities.Based on these demands,we propose the concept of the Internet of satellites(IoS)tailored to support the intelligent satellite cluster system.Specifically,we design both the logical and physical architectures of IoS and elaborate on its key enabling technologies.Finally,we present the research progress and outcomes achieved by our team on these core technologies,and discuss the challenges that remain.This paper aims to build consensus around intelligent and connected satellite technologies,promote innovation and standardization,and enhance the intelligent service capabilities of future large-scale satellite systems.展开更多
Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(...Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(2018)].They realized the self-testing of preparations and measurements in an N → 1(N ≥ 2) random access code(RAC), and provided robustness bounds in a 2 → 1 RAC.Since all N → 1 RACs with shared randomness are combinations of 2 → 1 and 3 → 1 RACs, the3 → 1 RAC is just as important as the 2 → 1 RAC.In this paper, we find a set of preparations and measurements in the3 → 1 RAC, and use them to complete the robustness self-testing analysis in the prepare-and-measure scenario.The method is robust to small but inevitable experimental errors.展开更多
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography...Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.展开更多
The distance-decay effect of molecular signals makes communication range a major challenge for diffusion-based Molecular Communication(MC).To solve this problem,the intermediate nano-machine is deployed as a relay bet...The distance-decay effect of molecular signals makes communication range a major challenge for diffusion-based Molecular Communication(MC).To solve this problem,the intermediate nano-machine is deployed as a relay between the transmitter and its intended receiver nano-machines.In this work,we employ the Depleted Molecule Shift Keying(D-MoSK)to model a Decode-and-Forward(DF)relay communication scheme.The closed-form expression of Bit Error Rate(BER)for the concerned DF relay with D-MoSK is derived.Meanwhile,the maximum a posteriori probability,minimum error probability,and maximum likelihood schemes are formulated for data detection.The relationships between BER and other key parameters,including the number of released molecules,receiving radius,and relay position,are investigated in detail.Simulation results show that the proposed scheme can improve communication reliability significantly.Moreover,the performance gain can be maximized by optimizing the position of the relay and the receiving radius.展开更多
The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G networks.Such hyper-massive and ...The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G networks.Such hyper-massive and global connectivity will introduce tremendous challenges into the operation and management of 6G networks,calling for revolutionary theories and technological innovations.To this end,we propose a new route to boost network capabilities toward a wisdom-evolutionary and primitive-concise network(WePCN)vision for the Ubiquitous-X 6G network.In particular,we aim to concretize the evolution path toward the WePCN by first conceiving a new semantic representation framework,namely semantic base,and then establishing an intelligent and efficient semantic communication(IE-SC)network architecture.In the IE-SC architecture,a semantic intelligence plane is employed to interconnect the semantic-empowered physical-bearing layer,network protocol layer,and application-intent layer via semantic information flows.The proposed architecture integrates artificial intelligence and network technologies to enable intelligent interactions among various communication objects in 6G.It features a lower bandwidth requirement,less redundancy,and more accurate intent identification.We also present a brief review of recent advances in semantic communications and highlight potential use cases,complemented by a range of open challenges for 6G.展开更多
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no...In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.展开更多
The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data....The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.展开更多
With the research of the upcoming sixth generation(6 G) systems, new technologies will require wider bandwidth, larger scale antenna arrays and more diverse wireless communication scenarios on the future channel model...With the research of the upcoming sixth generation(6 G) systems, new technologies will require wider bandwidth, larger scale antenna arrays and more diverse wireless communication scenarios on the future channel modeling. Considering channel model is prerequisite for system design and performance evaluation of 6 G technologies, we face a challenging task: how to accurately and efficiently model 6 G channel for various scenarios? This paper tries to answer it. Firstly, the features of cluster-nuclei(CN) and principle of cluster-nuclei based channel model(CNCM) are introduced. Then, a novel modeling framework is proposed to implement CNCM,which consists four steps: propagation environment reconstruction, cluster-nuclei identification, multipath parameters generation, and channel coefficients generation. Three-dimensional environment with material information is utilized to map CN with scatterers in the propagation pathway. CN are identified by geometrical and electric field calculation based on environmental mapping, and multipath components within CN are calculated by statistical characteristics of angle, power and delay domains. Finally, we present a three-level verification structure to investigate the accuracy and complexity of channel modeling comprehensively. Simulation results reveal that CNCM can perform higher accuracy than geometrybased stochastic model while lower complexity compared with ray-tracing model for practical propagation environment.展开更多
Utilizing the generalized measurement described by positive operator-wlued measure, this paper comes up with a protocol for teleportation of an unknown multi-particle entangled (GHZ) state with a certain probability...Utilizing the generalized measurement described by positive operator-wlued measure, this paper comes up with a protocol for teleportation of an unknown multi-particle entangled (GHZ) state with a certain probability. The feature of the present protocol is to weaken requirement for the quantum channel initially shared by sender and receiver. All unitary transformations performed by receiver are summarized into a formula. On the other hand, this paper explicitly constructs the efficient quantum circuits for implementing the proposed teleportation by means of universal quantum logic operations in quantum computation.展开更多
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack a...In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view.展开更多
Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectr...Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectral efficiency loss in transmission performance.Thus,a joint cluster formation and channel estimation scheme is proposed in this paper.Considering research remote radio heads(RRHs)centred serving scheme,a coalition game is formulated in order to maximize the spectral efficiency of cooperative RRHs under the conditions of balancing the data rate and the cost of channel estimation.As the cost influences to the necessary consumption of training length and estimation error.Particularly,an iterative semi-blind channel estimation and symbol detection approach is designed by expectation maximization algorithm,where the channel estimation process is initialized by subspace method with lower pilot length.Finally,the simulation results show that a stable cluster formation is established by our proposed coalition game method and it outperforms compared with full coordinated schemes.展开更多
Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resourc...Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resources from remote cloud to the network edge.However,it makes wireless networks more vulnerable to security attacks as well.To resolve this issue,in this article,we propose a secure yet trustless Blockchain-based F-RAN(BF-RAN),which allows a massive number of trustless devices to form a large-scale trusted cooperative network by leveraging the key features of blockchain,such as decentralization,tamper-proof,and traceability.The architecture of BF-RAN is first presented.Then,the key technologies,including access control,dynamic resource management,and network deployment are discussed.Finally,challenges and open problems in the BF-RAN are identified.展开更多
Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including p...Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including poor flexibility of network architecture,low adaptability to dynamic environments,the lack of network intelligence,and low resource utilization.To handle these challenges,a Software defined Intelligent STN(SISTN)architecture is introduced.Specifically,the hierarchical architecture of the proposal is described and a distributed deployment scheme for SISTNs controllers is proposed to realize agile and effective network management and control.Moreover,three use cases in SISTNs are discussed.Meanwhile,key techniques and their corresponding solutions are presented,followed by the identification of several open issues in SISTNs including compatibility with existing networks,the tradeoff between network flexibility and performance,and so on.展开更多
Internet of Things(IoT)technology is rapidly evolving,but there is no trusted platform to protect user privacy,protect information between different IoT domains,and promote edge processing.Therefore,we integrate the b...Internet of Things(IoT)technology is rapidly evolving,but there is no trusted platform to protect user privacy,protect information between different IoT domains,and promote edge processing.Therefore,we integrate the blockchain technology into constructing trusted IoT platforms.However,the application of blockchain in IoT is hampered by the challenges posed by heavy computing processes.To solve the problem,we put forward a blockchain framework based on mobile edge computing,in which the blockchain mining tasks can be offloaded to nearby nodes or the edge computing service providers and the encrypted hashes of blocks can be cached in the edge computing service providers.Moreover,we model the process of offloading and caching to ensure that both edge nodes and edge computing service providers obtain the maximum profit based on game theory and auction theory.Finally,the proposed mechanism is compared with the centralized mode,mode A(all the miners offload their tasks to the edge computing service providers),and mode B(all the miners offload their tasks to a group of neighbor devices).Simulation results show that under our mechanism,mining networks obtain more profits and consume less time on average.展开更多
As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl...As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications.展开更多
基金supported in part by National Key R&D Program of China(Grant No.2022YFC3803700)in part by the National Natural Science Foundation of China(Grant No.92067102)in part by the project of Beijing Laboratory of Advanced Information Networks.
文摘The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.
基金Supported by the National Natural Science Foundation of China under Grant Nos 60873191, 60903152 and 60821001, the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP) under Grant No 200800131016, Beijing Nova Program (No 2008B51), Key Project of the Ministry of Education of China (No 109014), Beijing Natural Science Foundation under Grant No 4072020, National Laboratory for Modern Communications Science Foundation of China under Grant No 9140C1101010601
文摘In a recent paper[J. Korean. Phys. Soc. 49 (2006) 459], two GHZ-state-based quantum secure direct communication protocols were presented. Here we point out that an eavesdropper can utilize a special property of GHZ states, i.e. "correlation-elicitable" to obtain half information of the transmitted secrets without being detected in both protocols. The particular attack strategy is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocols secure against this kind of attack.
基金Supported by the National Natural Science Foundation of China under Grant Nos 60873191,60903152 and 60821001the Specialized Research Fund for the Doctoral Program of Higher Education(SRFDP)under Grant No under Grant Nos 200800131016 and 20090005110010+1 种基金Beijing Nova Program under Grant No 2008B51,Key Project of the Ministry of Education of China under Grant No 109014Beijing Natural Science Foundation under Grant No 4072020.
文摘The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a successful man-in-the-middle attack,where he/she can obtain or even modify the transmitted secret without introducing any error.The particular attack strategy is demonstrated and an improved protocol is presented.
基金supported by the National Natural Science Foundation of China(No.62201079)the Beijing Natural Science Foundation(No.L232051).
文摘In 6G,artificial intelligence represented by deep nerual network(DNN)will unleash its potential and empower IoT applications to transform into intelligent IoT applications.However,whole DNNbased inference is difficult to carry out on resourceconstrained intelligent IoT devices and will suffer privacy leakage when offloading to the cloud or mobile edge computation server(MECs).In this paper,we formulate a privacy and delay dual-driven device-edge collaborative inference(P4DE-CI)system to preserve the privacy of raw data while accelerating the intelligent inference process,where the intelligent IoT devices run the front-end part of DNN model and the MECs execute the back-end part of DNN model.Considering three typical privacy leakage models and the end-to-end delay of collaborative DNN-based inference,we define a novel intelligent inference Quality of service(I2-QoS)metric as the weighted summation of the inference latency and privacy preservation level.Moreover,we propose a DDPG-based joint DNN model optimization and resource allocation algorithm to maximize I2-QoS,by optimizing the association relationship between intelligent IoT devices and MECs,the DNN model placement decision,and the DNN model partition decision.Experiments carried out on the AlexNet model reveal that the proposed algorithm has better performance in both privacy-preserving and inference-acceleration.
基金funded by the Hong Kong-Macao-Taiwan Science and Technology Cooperation Project of the Science and Technology Innovation Action Plan in Shanghai,China(23510760200)the Oriental Talent Youth Program of Shanghai,China(No.Y3DFRCZL01)+1 种基金the Outstanding Program of the Youth Innovation Promotion Association of the Chinese Academy of Sciences(No.Y2023080)the Strategic Priority Research Program of the Chinese Academy of Sciences Category A(No.XDA0360404).
文摘The number of satellites,especially those operating in Low-Earth Orbit(LEO),has been exploding in recent years.Additionally,the burgeoning development of Artificial Intelligence(AI)software and hardware has opened up new industrial opportunities in both air and space,with satellite-powered computing emerging as a new computing paradigm:Orbital Edge Computing(OEC).Compared to terrestrial edge computing,the mobility of LEO satellites and their limited communication,computation,and storage resources pose challenges in designing task-specific scheduling algorithms.Previous survey papers have largely focused on terrestrial edge computing or the integration of space and ground technologies,lacking a comprehensive summary of OEC architecture,algorithms,and case studies.This paper conducts a comprehensive survey and analysis of OEC's system architecture,applications,algorithms,and simulation tools,providing a solid background for researchers in the field.By discussing OEC use cases and the challenges faced,potential research directions for future OEC research are proposed.
基金supported in part by National Natural Science Foundation of China(62401612)in part by Beijing Nova Program of China(20230484258).
文摘The integration of emerging technologies such as artificial intelligence and cloud computing is accelerating the development of intelligent and autonomous satellite systems.However,limitations in onboard sensing,computing,storage,and energy resources continue to constrain the intelligent functionalities of individual satellites.Currently,most studies focus on either satellite intelligence or satellite networking,while systematic studies on their integration remain scarce.To address this gap,this paper introduces the concept of an intelligent satellite cluster system,which leverages satellite networks to enable collaborative intelligence among satellites,thereby enhancing the overall system intelligence.After summarizing the typical use cases of the intelligent satellite cluster system,we analyze the corresponding demands on network capabilities.Based on these demands,we propose the concept of the Internet of satellites(IoS)tailored to support the intelligent satellite cluster system.Specifically,we design both the logical and physical architectures of IoS and elaborate on its key enabling technologies.Finally,we present the research progress and outcomes achieved by our team on these core technologies,and discuss the challenges that remain.This paper aims to build consensus around intelligent and connected satellite technologies,promote innovation and standardization,and enhance the intelligent service capabilities of future large-scale satellite systems.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61572081,61672110,and 61671082)
文摘Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(2018)].They realized the self-testing of preparations and measurements in an N → 1(N ≥ 2) random access code(RAC), and provided robustness bounds in a 2 → 1 RAC.Since all N → 1 RACs with shared randomness are combinations of 2 → 1 and 3 → 1 RACs, the3 → 1 RAC is just as important as the 2 → 1 RAC.In this paper, we find a set of preparations and measurements in the3 → 1 RAC, and use them to complete the robustness self-testing analysis in the prepare-and-measure scenario.The method is robust to small but inevitable experimental errors.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61170272,61272514,61003287,and 61070163)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20100005120002)+3 种基金the Fok Ying Tong Education Foundation (Grant No. 131067)the Natural Science Foundation of Shandong Province,China (Grant No. ZR2011FM023)the Outstanding Research Award Fund for Young Scientists of Shandong Province,China (Grant No. BS2011DX034)the Fundamental Research Funds for Central Universities of China (Grant No. BUPT2012RC0221)
文摘Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.
基金This paper was supported in part by the National Natural Science Foundation of China under No.61921003,61925101,and 61831002the State Major Science and Technology Special Project(Grant No.2018ZX03001023)+3 种基金the Beijing Natural Science Foundation under No.JQ18016,and the National Program for Special Support of Eminent ProfessionalsThis paper was also supported by the Doctoral Research Fund of North China Institute of Aerospace Engineering under No.BKY-2021-17the North China Institute of Aerospace Engineering Foundation Project under No.KY-2021-2Langfang Science Technology Research&Development Plan Project under No.2020019002C.
文摘The distance-decay effect of molecular signals makes communication range a major challenge for diffusion-based Molecular Communication(MC).To solve this problem,the intermediate nano-machine is deployed as a relay between the transmitter and its intended receiver nano-machines.In this work,we employ the Depleted Molecule Shift Keying(D-MoSK)to model a Decode-and-Forward(DF)relay communication scheme.The closed-form expression of Bit Error Rate(BER)for the concerned DF relay with D-MoSK is derived.Meanwhile,the maximum a posteriori probability,minimum error probability,and maximum likelihood schemes are formulated for data detection.The relationships between BER and other key parameters,including the number of released molecules,receiving radius,and relay position,are investigated in detail.Simulation results show that the proposed scheme can improve communication reliability significantly.Moreover,the performance gain can be maximized by optimizing the position of the relay and the receiving radius.
基金the National Key Research and Development Program of China(2019YFC1511302)in part by the National Natural Science Foundation of China(61871057)in part by the Fundamental Research Funds for the Central Universities(2019XD-A13).
文摘The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G networks.Such hyper-massive and global connectivity will introduce tremendous challenges into the operation and management of 6G networks,calling for revolutionary theories and technological innovations.To this end,we propose a new route to boost network capabilities toward a wisdom-evolutionary and primitive-concise network(WePCN)vision for the Ubiquitous-X 6G network.In particular,we aim to concretize the evolution path toward the WePCN by first conceiving a new semantic representation framework,namely semantic base,and then establishing an intelligent and efficient semantic communication(IE-SC)network architecture.In the IE-SC architecture,a semantic intelligence plane is employed to interconnect the semantic-empowered physical-bearing layer,network protocol layer,and application-intent layer via semantic information flows.The proposed architecture integrates artificial intelligence and network technologies to enable intelligent interactions among various communication objects in 6G.It features a lower bandwidth requirement,less redundancy,and more accurate intent identification.We also present a brief review of recent advances in semantic communications and highlight potential use cases,complemented by a range of open challenges for 6G.
基金the National Natural Science Foundation of China under Grant 61701059,Grant 61941114,and Grant 61831002,in part by the Fundamental Research Funds for the Central Universities of New TeachersProject,in part by the Chongqing Technological Innovation and Application Development Projects under Grant cstc2019jscx-msxm1322,and in part by the Eighteentg Open Foundation of State Key Lab of Integrated Services Networks of Xidian University under Grant ISN20-05.
文摘In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.
基金supported by the National High-tech R&D Program("863"Program)of China(No.2013AA013505)the National Science Foundation of China(No.61472213)State Scholarship Fund from China Scholarship Council(No.201406210270)
文摘The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.
基金supported by National Science Fund for Distinguished Young Scholars (No.61925102)Beijing University of Posts and TelecommunicationsChina Mobile Research Institute Joint Innovation Center。
文摘With the research of the upcoming sixth generation(6 G) systems, new technologies will require wider bandwidth, larger scale antenna arrays and more diverse wireless communication scenarios on the future channel modeling. Considering channel model is prerequisite for system design and performance evaluation of 6 G technologies, we face a challenging task: how to accurately and efficiently model 6 G channel for various scenarios? This paper tries to answer it. Firstly, the features of cluster-nuclei(CN) and principle of cluster-nuclei based channel model(CNCM) are introduced. Then, a novel modeling framework is proposed to implement CNCM,which consists four steps: propagation environment reconstruction, cluster-nuclei identification, multipath parameters generation, and channel coefficients generation. Three-dimensional environment with material information is utilized to map CN with scatterers in the propagation pathway. CN are identified by geometrical and electric field calculation based on environmental mapping, and multipath components within CN are calculated by statistical characteristics of angle, power and delay domains. Finally, we present a three-level verification structure to investigate the accuracy and complexity of channel modeling comprehensively. Simulation results reveal that CNCM can perform higher accuracy than geometrybased stochastic model while lower complexity compared with ray-tracing model for practical propagation environment.
基金Project supported by the National High Technology Research and Development Program of China(Grant No2006AA01Z419)the Major Research Plan of the National Natural Foundation of China(Grant No90604023)+1 种基金the National Laboratory for Modern Communications Science Foundation of China(Grant No9140C1101010601)the Natural Science Foundation of Beijing(Grant No4072020)
文摘Utilizing the generalized measurement described by positive operator-wlued measure, this paper comes up with a protocol for teleportation of an unknown multi-particle entangled (GHZ) state with a certain probability. The feature of the present protocol is to weaken requirement for the quantum channel initially shared by sender and receiver. All unitary transformations performed by receiver are summarized into a formula. On the other hand, this paper explicitly constructs the efficient quantum circuits for implementing the proposed teleportation by means of universal quantum logic operations in quantum computation.
基金Project supported by NSFC(Grant Nos.61671087,61272514,61170272,61003287,61571335,61628209)the Fok Ying Tong Education Foundation(Grant No.131067)+2 种基金the National Key R&D Program of China under Grant 2017YFB0802300the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ016)Hubei Science Foundation(2016CFA030,2017AAA125)。
文摘In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view.
基金supported in part by the State Major Science and Technology Special Project(Grant No.2018ZX03001025)the National Natural Science Foundation of China(No.61831002 and No.61671074)the Fundamental Research Funds for the Central Universities under Grant No.2018XKJC01
文摘Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectral efficiency loss in transmission performance.Thus,a joint cluster formation and channel estimation scheme is proposed in this paper.Considering research remote radio heads(RRHs)centred serving scheme,a coalition game is formulated in order to maximize the spectral efficiency of cooperative RRHs under the conditions of balancing the data rate and the cost of channel estimation.As the cost influences to the necessary consumption of training length and estimation error.Particularly,an iterative semi-blind channel estimation and symbol detection approach is designed by expectation maximization algorithm,where the channel estimation process is initialized by subspace method with lower pilot length.Finally,the simulation results show that a stable cluster formation is established by our proposed coalition game method and it outperforms compared with full coordinated schemes.
基金This work was supported in part by National Key R&D Program of China(2020YFB1806700)in part by the Key Research and Development Project of Sichuan Provincial Department of Science and Technology(2018JZ0071)+3 种基金in part by the Zhejiang Lab(No.2021KF0AB03)in part by the Chongqing Technological Innovation and Application Development Projects(cstc2019jscx-msxm1322)in part by the Sichuan International Science and Technology Innovation Cooperation/Hong Kong,Macao and Taiwan Science and Technology Innovation Cooperation Project(2019YFH0163)in part by the Young Elite Scientist Sponsorship Program by China Institute of Communications.
文摘Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resources from remote cloud to the network edge.However,it makes wireless networks more vulnerable to security attacks as well.To resolve this issue,in this article,we propose a secure yet trustless Blockchain-based F-RAN(BF-RAN),which allows a massive number of trustless devices to form a large-scale trusted cooperative network by leveraging the key features of blockchain,such as decentralization,tamper-proof,and traceability.The architecture of BF-RAN is first presented.Then,the key technologies,including access control,dynamic resource management,and network deployment are discussed.Finally,challenges and open problems in the BF-RAN are identified.
基金This work was supported in part by the National Key Research and Development Program of China under Grant 2020YFB1806703in part by the National Natural Science Foundation of China under Grant 62001053,Grant 61831002,and Grant 61925101in part by Young Elite Scientist Sponsorship Program by China Institute of Communications,and in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2020106.
文摘Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including poor flexibility of network architecture,low adaptability to dynamic environments,the lack of network intelligence,and low resource utilization.To handle these challenges,a Software defined Intelligent STN(SISTN)architecture is introduced.Specifically,the hierarchical architecture of the proposal is described and a distributed deployment scheme for SISTNs controllers is proposed to realize agile and effective network management and control.Moreover,three use cases in SISTNs are discussed.Meanwhile,key techniques and their corresponding solutions are presented,followed by the identification of several open issues in SISTNs including compatibility with existing networks,the tradeoff between network flexibility and performance,and so on.
基金This work is supported by National Natural Science Foundation of China(61702048)。
文摘Internet of Things(IoT)technology is rapidly evolving,but there is no trusted platform to protect user privacy,protect information between different IoT domains,and promote edge processing.Therefore,we integrate the blockchain technology into constructing trusted IoT platforms.However,the application of blockchain in IoT is hampered by the challenges posed by heavy computing processes.To solve the problem,we put forward a blockchain framework based on mobile edge computing,in which the blockchain mining tasks can be offloaded to nearby nodes or the edge computing service providers and the encrypted hashes of blocks can be cached in the edge computing service providers.Moreover,we model the process of offloading and caching to ensure that both edge nodes and edge computing service providers obtain the maximum profit based on game theory and auction theory.Finally,the proposed mechanism is compared with the centralized mode,mode A(all the miners offload their tasks to the edge computing service providers),and mode B(all the miners offload their tasks to a group of neighbor devices).Simulation results show that under our mechanism,mining networks obtain more profits and consume less time on average.
基金supported in part by the National Natural Science Foundation of China (NSFC) under Grant 61671081in part by the Funds for International Cooperation and Exchange of NSFC under Grant 61720106007+2 种基金in part by the 111 Project under Grant B18008in part by the Beijing Natural Science Foundation under Grant 4172042in part by the Fundamental Research Funds for the Central Universities under Grant 2018XKJC01
文摘As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications.