期刊文献+
共找到488篇文章
< 1 2 25 >
每页显示 20 50 100
Cross-Domain Time Synchronization in Software-Defined Time-Sensitive Networking 被引量:1
1
作者 Zhang Xiaodong Shou Guochu +2 位作者 Li Hongxing Liu Yaqiong Hu Yihong 《China Communications》 2025年第9期289-306,共18页
The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in... The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility. 展开更多
关键词 cross-domain time synchronization de-terministic communications error compensation software-defined networking(SDN) time-sensitive networking(TSN)
在线阅读 下载PDF
Cryptanalysis and Improvement of Two GHZ-State-Based QSDC Protocols 被引量:1
2
作者 郭奋卓 秦素娟 +1 位作者 温巧燕 朱甫臣 《Chinese Physics Letters》 SCIE CAS CSCD 2010年第9期34-37,共4页
In a recent paper[J. Korean. Phys. Soc. 49 (2006) 459], two GHZ-state-based quantum secure direct communication protocols were presented. Here we point out that an eavesdropper can utilize a special property of GHZ ... In a recent paper[J. Korean. Phys. Soc. 49 (2006) 459], two GHZ-state-based quantum secure direct communication protocols were presented. Here we point out that an eavesdropper can utilize a special property of GHZ states, i.e. "correlation-elicitable" to obtain half information of the transmitted secrets without being detected in both protocols. The particular attack strategy is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocols secure against this kind of attack. 展开更多
关键词 通信协议 GHZ态 密码分析 基础 攻击策略 大肠杆菌 秘密信息 安全性
原文传递
Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States 被引量:1
3
作者 GAO Fei QIN Su-Juan +1 位作者 GUO Fen-Zhuo WEN Qiao-Yan 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第2期31-34,共4页
The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a suc... The security of the quantum secure direct communication(QSDC)and authentication protocol based on Bell states is analyzed.It is shown that an eavesdropper can invalidate the authentication function,and implement a successful man-in-the-middle attack,where he/she can obtain or even modify the transmitted secret without introducing any error.The particular attack strategy is demonstrated and an improved protocol is presented. 展开更多
关键词 introducing QUANTUM modify
原文传递
P4DE-CI:Privacy and Delay Dual-Driven Device-Edge Collaborative Inference for Intelligent Internet of Things
4
作者 Han Shujun Yan Kaiwen +3 位作者 Zhang Wenzhao Xu Xiaodong Wang Bizhu Tao Xiaofeng 《China Communications》 2025年第12期224-239,共16页
In 6G,artificial intelligence represented by deep nerual network(DNN)will unleash its potential and empower IoT applications to transform into intelligent IoT applications.However,whole DNNbased inference is difficult... In 6G,artificial intelligence represented by deep nerual network(DNN)will unleash its potential and empower IoT applications to transform into intelligent IoT applications.However,whole DNNbased inference is difficult to carry out on resourceconstrained intelligent IoT devices and will suffer privacy leakage when offloading to the cloud or mobile edge computation server(MECs).In this paper,we formulate a privacy and delay dual-driven device-edge collaborative inference(P4DE-CI)system to preserve the privacy of raw data while accelerating the intelligent inference process,where the intelligent IoT devices run the front-end part of DNN model and the MECs execute the back-end part of DNN model.Considering three typical privacy leakage models and the end-to-end delay of collaborative DNN-based inference,we define a novel intelligent inference Quality of service(I2-QoS)metric as the weighted summation of the inference latency and privacy preservation level.Moreover,we propose a DDPG-based joint DNN model optimization and resource allocation algorithm to maximize I2-QoS,by optimizing the association relationship between intelligent IoT devices and MECs,the DNN model placement decision,and the DNN model partition decision.Experiments carried out on the AlexNet model reveal that the proposed algorithm has better performance in both privacy-preserving and inference-acceleration. 展开更多
关键词 device-edge collaborative inference DNN model placement and partition inference delay PRIVACY-PRESERVING resource allocation
在线阅读 下载PDF
A comprehensive survey of orbital edge computing:Systems,applications,and algorithms
5
作者 Zengshan YIN Changhao WU +4 位作者 Chongbin GUO Yuanchun LI Mengwei XU Weiwei GAO Chuanxiu CHI 《Chinese Journal of Aeronautics》 2025年第7期310-339,共30页
The number of satellites,especially those operating in Low-Earth Orbit(LEO),has been exploding in recent years.Additionally,the burgeoning development of Artificial Intelligence(AI)software and hardware has opened up ... The number of satellites,especially those operating in Low-Earth Orbit(LEO),has been exploding in recent years.Additionally,the burgeoning development of Artificial Intelligence(AI)software and hardware has opened up new industrial opportunities in both air and space,with satellite-powered computing emerging as a new computing paradigm:Orbital Edge Computing(OEC).Compared to terrestrial edge computing,the mobility of LEO satellites and their limited communication,computation,and storage resources pose challenges in designing task-specific scheduling algorithms.Previous survey papers have largely focused on terrestrial edge computing or the integration of space and ground technologies,lacking a comprehensive summary of OEC architecture,algorithms,and case studies.This paper conducts a comprehensive survey and analysis of OEC's system architecture,applications,algorithms,and simulation tools,providing a solid background for researchers in the field.By discussing OEC use cases and the challenges faced,potential research directions for future OEC research are proposed. 展开更多
关键词 Orbital edge computing Ubiquitous computing Large-scale satellite constellations Computation offloading
原文传递
Internet of Satellites(IoS)for Intelligent Satellite Cluster:Applications,Methods,and Challenges
6
作者 Guangteng Fan Peng Wu +7 位作者 Mengqi Yang Jian Wang Dechao Ran Jincheng Dai Yimeng Zhang Lu Cao Wenjun Xu Ping Zhang 《Engineering》 2025年第11期155-170,共16页
The integration of emerging technologies such as artificial intelligence and cloud computing is accelerating the development of intelligent and autonomous satellite systems.However,limitations in onboard sensing,compu... The integration of emerging technologies such as artificial intelligence and cloud computing is accelerating the development of intelligent and autonomous satellite systems.However,limitations in onboard sensing,computing,storage,and energy resources continue to constrain the intelligent functionalities of individual satellites.Currently,most studies focus on either satellite intelligence or satellite networking,while systematic studies on their integration remain scarce.To address this gap,this paper introduces the concept of an intelligent satellite cluster system,which leverages satellite networks to enable collaborative intelligence among satellites,thereby enhancing the overall system intelligence.After summarizing the typical use cases of the intelligent satellite cluster system,we analyze the corresponding demands on network capabilities.Based on these demands,we propose the concept of the Internet of satellites(IoS)tailored to support the intelligent satellite cluster system.Specifically,we design both the logical and physical architectures of IoS and elaborate on its key enabling technologies.Finally,we present the research progress and outcomes achieved by our team on these core technologies,and discuss the challenges that remain.This paper aims to build consensus around intelligent and connected satellite technologies,promote innovation and standardization,and enhance the intelligent service capabilities of future large-scale satellite systems. 展开更多
关键词 Intelligent satellite cluster Internet of satellites(IoS) Space edge computing Satellite semantic communication
在线阅读 下载PDF
Robustness self-testing of states and measurements in the prepare-and-measure scenario with 3 → 1 random access code
7
作者 Shi-Hui Wei Fen-Zhuo Guo +1 位作者 Xin-Hui Li Qiao-Yan Wen 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第7期144-151,共8页
Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(... Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(2018)].They realized the self-testing of preparations and measurements in an N → 1(N ≥ 2) random access code(RAC), and provided robustness bounds in a 2 → 1 RAC.Since all N → 1 RACs with shared randomness are combinations of 2 → 1 and 3 → 1 RACs, the3 → 1 RAC is just as important as the 2 → 1 RAC.In this paper, we find a set of preparations and measurements in the3 → 1 RAC, and use them to complete the robustness self-testing analysis in the prepare-and-measure scenario.The method is robust to small but inevitable experimental errors. 展开更多
关键词 ROBUSTNESS SELF-TESTING prepare-and-measure SCENARIO 3 1 random access CODE
原文传递
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
8
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期199-202,共4页
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 展开更多
关键词 quantum steganography GHZ4 entangled state quantum cryptography quantum communication
原文传递
Performance analysis of diffusion-based decode-and-forward relay with depleted molecule shift keying
9
作者 Jiaxing Wang Mugen Peng Yaqiong Liu 《Digital Communications and Networks》 SCIE CSCD 2021年第3期399-409,共11页
The distance-decay effect of molecular signals makes communication range a major challenge for diffusion-based Molecular Communication(MC).To solve this problem,the intermediate nano-machine is deployed as a relay bet... The distance-decay effect of molecular signals makes communication range a major challenge for diffusion-based Molecular Communication(MC).To solve this problem,the intermediate nano-machine is deployed as a relay between the transmitter and its intended receiver nano-machines.In this work,we employ the Depleted Molecule Shift Keying(D-MoSK)to model a Decode-and-Forward(DF)relay communication scheme.The closed-form expression of Bit Error Rate(BER)for the concerned DF relay with D-MoSK is derived.Meanwhile,the maximum a posteriori probability,minimum error probability,and maximum likelihood schemes are formulated for data detection.The relationships between BER and other key parameters,including the number of released molecules,receiving radius,and relay position,are investigated in detail.Simulation results show that the proposed scheme can improve communication reliability significantly.Moreover,the performance gain can be maximized by optimizing the position of the relay and the receiving radius. 展开更多
关键词 DIFFUSION Molecular communication Decode-and-Forward relay Bit error rate
在线阅读 下载PDF
Toward Wisdom-Evolutionary and Primitive-Concise 6G:A New Paradigm of Semantic Communication Networks 被引量:69
10
作者 Ping Zhang Wenjun Xu +8 位作者 Hui Gao Kai Niu Xiaodong Xu Xiaoqi Qin Caixia Yuan Zhijin Qin Haitao Zhao Jibo Wei Fangwei Zhang 《Engineering》 SCIE EI 2022年第1期60-73,共14页
The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G networks.Such hyper-massive and ... The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G networks.Such hyper-massive and global connectivity will introduce tremendous challenges into the operation and management of 6G networks,calling for revolutionary theories and technological innovations.To this end,we propose a new route to boost network capabilities toward a wisdom-evolutionary and primitive-concise network(WePCN)vision for the Ubiquitous-X 6G network.In particular,we aim to concretize the evolution path toward the WePCN by first conceiving a new semantic representation framework,namely semantic base,and then establishing an intelligent and efficient semantic communication(IE-SC)network architecture.In the IE-SC architecture,a semantic intelligence plane is employed to interconnect the semantic-empowered physical-bearing layer,network protocol layer,and application-intent layer via semantic information flows.The proposed architecture integrates artificial intelligence and network technologies to enable intelligent interactions among various communication objects in 6G.It features a lower bandwidth requirement,less redundancy,and more accurate intent identification.We also present a brief review of recent advances in semantic communications and highlight potential use cases,complemented by a range of open challenges for 6G. 展开更多
关键词 6G Semantic information Semantic communication Intelligent communication
在线阅读 下载PDF
Performance analysis and comparison of PoW,PoS and DAG based blockchains 被引量:29
11
作者 Bin Cao Zhenghui Zhang +4 位作者 Daquan Feng Shengli Zhang Lei Zhang Mugen Peng Yun Li 《Digital Communications and Networks》 SCIE 2020年第4期480-485,共6页
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no... In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions. 展开更多
关键词 Blockchain Proof of work Proof of stake Direct acyclic graph Performance comparison
在线阅读 下载PDF
A Survey on Information-Centric Networking: Rationales, Designs and Debates 被引量:8
12
作者 JIANG Xiaoke BI Jun +1 位作者 NAN Guoshun LI Zhaogeng 《China Communications》 SCIE CSCD 2015年第7期1-12,共12页
The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data.... The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses. 展开更多
关键词 information-centric networking content-centric networking future internet architecture named-data networking PUBLISH-SUBSCRIBE
在线阅读 下载PDF
Implementation Framework and Validation of Cluster-Nuclei Based Channel Model Using Environmental Mapping for 6G Communication Systems 被引量:6
13
作者 Li Yu Yuxiang Zhang +1 位作者 Jianhua Zhang Zhiqiang Yuan 《China Communications》 SCIE CSCD 2022年第4期1-13,共13页
With the research of the upcoming sixth generation(6 G) systems, new technologies will require wider bandwidth, larger scale antenna arrays and more diverse wireless communication scenarios on the future channel model... With the research of the upcoming sixth generation(6 G) systems, new technologies will require wider bandwidth, larger scale antenna arrays and more diverse wireless communication scenarios on the future channel modeling. Considering channel model is prerequisite for system design and performance evaluation of 6 G technologies, we face a challenging task: how to accurately and efficiently model 6 G channel for various scenarios? This paper tries to answer it. Firstly, the features of cluster-nuclei(CN) and principle of cluster-nuclei based channel model(CNCM) are introduced. Then, a novel modeling framework is proposed to implement CNCM,which consists four steps: propagation environment reconstruction, cluster-nuclei identification, multipath parameters generation, and channel coefficients generation. Three-dimensional environment with material information is utilized to map CN with scatterers in the propagation pathway. CN are identified by geometrical and electric field calculation based on environmental mapping, and multipath components within CN are calculated by statistical characteristics of angle, power and delay domains. Finally, we present a three-level verification structure to investigate the accuracy and complexity of channel modeling comprehensively. Simulation results reveal that CNCM can perform higher accuracy than geometrybased stochastic model while lower complexity compared with ray-tracing model for practical propagation environment. 展开更多
关键词 channel model 6G cluster-nuclei environmental mapping SCATTERER RAY-TRACING geometrybased stochastic model
在线阅读 下载PDF
Probabilistic teleportation of multi-particle partially entangled state 被引量:6
14
作者 陈秀波 杜建忠 +1 位作者 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第3期771-777,共7页
Utilizing the generalized measurement described by positive operator-wlued measure, this paper comes up with a protocol for teleportation of an unknown multi-particle entangled (GHZ) state with a certain probability... Utilizing the generalized measurement described by positive operator-wlued measure, this paper comes up with a protocol for teleportation of an unknown multi-particle entangled (GHZ) state with a certain probability. The feature of the present protocol is to weaken requirement for the quantum channel initially shared by sender and receiver. All unitary transformations performed by receiver are summarized into a formula. On the other hand, this paper explicitly constructs the efficient quantum circuits for implementing the proposed teleportation by means of universal quantum logic operations in quantum computation. 展开更多
关键词 quantum teleportation quantum circuits positive operator-valued measure unitary transformations
原文传递
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States 被引量:7
15
作者 Gang Xu Ke Xiao +2 位作者 Zongpeng Li Xin-Xin Niu Michael Ryan 《Computers, Materials & Continua》 SCIE EI 2019年第3期809-827,共19页
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack a... In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view. 展开更多
关键词 Controlled secure direct communication cluster state three-qubit partially entangled state entanglement swapping.
在线阅读 下载PDF
Joint Design of Coalition Formation and Semi-Blind Channel Estimation in Fog Radio Access Networks 被引量:3
16
作者 Zhifeng Wang Feifan Yang +3 位作者 Shi Yan Saleemullah Memon Zhongyuan Zhao Chunjing Hu 《China Communications》 SCIE CSCD 2019年第11期1-15,共15页
Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectr... Coordinated signal processing can obtain a huge transmission gain for Fog Radio Access Networks(F-RANs).However,integrating into large scale,it will lead to high computation complexity in channel estimation and spectral efficiency loss in transmission performance.Thus,a joint cluster formation and channel estimation scheme is proposed in this paper.Considering research remote radio heads(RRHs)centred serving scheme,a coalition game is formulated in order to maximize the spectral efficiency of cooperative RRHs under the conditions of balancing the data rate and the cost of channel estimation.As the cost influences to the necessary consumption of training length and estimation error.Particularly,an iterative semi-blind channel estimation and symbol detection approach is designed by expectation maximization algorithm,where the channel estimation process is initialized by subspace method with lower pilot length.Finally,the simulation results show that a stable cluster formation is established by our proposed coalition game method and it outperforms compared with full coordinated schemes. 展开更多
关键词 channel estimation CLUSTER formation GAME theory FOG RADIO ACCESS networks(F-RANs)
在线阅读 下载PDF
Blockchain-based fog radio access networks:Architecture,key technologies,and challenges 被引量:5
17
作者 Zixin Wang Bin Cao +2 位作者 Chenxi Liu Congfang Xu Lei Zhang 《Digital Communications and Networks》 SCIE CSCD 2022年第5期720-726,共7页
Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resourc... Fog Radio Access Network(F-RAN)has been regarded as a promising solution to the alleviation of the ever-increasing traffic burden on current and future wireless networks,for it shifts the caching and computing resources from remote cloud to the network edge.However,it makes wireless networks more vulnerable to security attacks as well.To resolve this issue,in this article,we propose a secure yet trustless Blockchain-based F-RAN(BF-RAN),which allows a massive number of trustless devices to form a large-scale trusted cooperative network by leveraging the key features of blockchain,such as decentralization,tamper-proof,and traceability.The architecture of BF-RAN is first presented.Then,the key technologies,including access control,dynamic resource management,and network deployment are discussed.Finally,challenges and open problems in the BF-RAN are identified. 展开更多
关键词 F-RAN Blockchain 5G Internet of things
在线阅读 下载PDF
Software defined intelligent satellite-terrestrial integrated networks:Insights and challenges 被引量:4
18
作者 Shuo Yuan Mugen Peng +1 位作者 Yaohua Sun Xiqing Liu 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1331-1339,共9页
Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including p... Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including poor flexibility of network architecture,low adaptability to dynamic environments,the lack of network intelligence,and low resource utilization.To handle these challenges,a Software defined Intelligent STN(SISTN)architecture is introduced.Specifically,the hierarchical architecture of the proposal is described and a distributed deployment scheme for SISTNs controllers is proposed to realize agile and effective network management and control.Moreover,three use cases in SISTNs are discussed.Meanwhile,key techniques and their corresponding solutions are presented,followed by the identification of several open issues in SISTNs including compatibility with existing networks,the tradeoff between network flexibility and performance,and so on. 展开更多
关键词 Satellite-terrestrial network Software-defined network Artificial intelligence Reconfigurable networking
在线阅读 下载PDF
Edge Computing-Based Tasks Offloading and Block Caching for Mobile Blockchain 被引量:3
19
作者 Yong Yan Yao Dai +2 位作者 Zhiqiang Zhou Wei Jiang Shaoyong Guo 《Computers, Materials & Continua》 SCIE EI 2020年第2期905-915,共11页
Internet of Things(IoT)technology is rapidly evolving,but there is no trusted platform to protect user privacy,protect information between different IoT domains,and promote edge processing.Therefore,we integrate the b... Internet of Things(IoT)technology is rapidly evolving,but there is no trusted platform to protect user privacy,protect information between different IoT domains,and promote edge processing.Therefore,we integrate the blockchain technology into constructing trusted IoT platforms.However,the application of blockchain in IoT is hampered by the challenges posed by heavy computing processes.To solve the problem,we put forward a blockchain framework based on mobile edge computing,in which the blockchain mining tasks can be offloaded to nearby nodes or the edge computing service providers and the encrypted hashes of blocks can be cached in the edge computing service providers.Moreover,we model the process of offloading and caching to ensure that both edge nodes and edge computing service providers obtain the maximum profit based on game theory and auction theory.Finally,the proposed mechanism is compared with the centralized mode,mode A(all the miners offload their tasks to the edge computing service providers),and mode B(all the miners offload their tasks to a group of neighbor devices).Simulation results show that under our mechanism,mining networks obtain more profits and consume less time on average. 展开更多
关键词 Edge computing blockchain mining offloading block caching
在线阅读 下载PDF
A Survey of Applications Research on Content-Centric Networking 被引量:2
20
作者 Xiuquan Qiao Hongyi Wang +3 位作者 Wei Tan Athanasios V.Vasilakos Junliang Chen MBrian Blake 《China Communications》 SCIE CSCD 2019年第9期122-140,共19页
As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl... As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications. 展开更多
关键词 Content-centric networking(CCN) named-data NETWORKING (NDN) APPLICATIONS information-centric NETWORKING FUTURE Internet
在线阅读 下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部