Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Time of arrival positioning based on time reversal
ZHANG Qilin, LI Fangwei, WANG Mingyue
Journal of Computer Applications    2021, 41 (3): 820-824.   DOI: 10.11772/j.issn.1001-9081.2020060976
Abstract394)      PDF (950KB)(707)       Save
It is difficult for traditional algorithms to accurately find out the first direct path in indoor Ultra Wide Band (UWB) Time Of Arrival (TOA) positioning system, resulting in low positioning accuracy. In order to solve the problem, a TOA indoor UWB positioning algorithm based on Time Reversal (TR) was proposed. Firstly, the spatial-temporal focusing characteristic of TR processing was used to determine the first direct path, so as to estimate the TOA of this path. Then, the Weighted Least Squares (WLS) positioning algorithm was used to assign the corresponding weights to different estimation components for improving the positioning accuracy. The simulation results show that, compared with the traditional TOA positioning, the proposed scheme has the Root Mean Square Error (RMSE) reduced by 28.6% under the low signal-to-noise ratio condition. It can be seen that the proposed scheme improves the system positioning accuracy significantly.
Reference | Related Articles | Metrics
Secure optimized transmission scheme of artificial noise assisted time inversion in D2D cross-cell communication
LI Fangwei, ZHOU Jiawei, ZHANG Haibo
Journal of Computer Applications    2019, 39 (9): 2658-2663.   DOI: 10.11772/j.issn.1001-9081.2019020298
Abstract470)      PDF (857KB)(290)       Save

In order to solve the problem of intercellular eavesdropping in Device to Device (D2D) communication, an anti-eavesdropping secure transmission scheme based on artificial noise assisted Time-Reversal (TR) was proposed. Firstly, the interference between cells was eliminated under the cross-cell channel model. Secondly, the ability of eavesdropping users to steal information was deteriorated by sending artificial noise to the base station to assist TR technology. Finally, in order to meet the needs of cellular users for service quality and maximize the system traversal secrecy rate, the power control allocation scheme with convex optimization was adopted to maximize the transmitted power of D2D users. Through simulation experiment analysis, compared with the artificial noise scheme, this scheme improves the achievable secrecy rate of 0.8 b·s-1·Hz-1 under the same Signal-to-Noise Ratio (SNR). In addition, with the increase of the number of neighboring cells, this scheme has improvement on the reachable secrecy rate more and more obvious.

Reference | Related Articles | Metrics
Improved method of situation assessment method based on hidden Markov model
LI Fangwei, LI Qi, ZHU Jiang
Journal of Computer Applications    2017, 37 (5): 1331-1334.   DOI: 10.11772/j.issn.1001-9081.2017.05.1331
Abstract679)      PDF (746KB)(490)       Save
Concerning the problem that the Hidden Markov Model (HMM) parameters are difficult to configure, an improved method of situation assessment based on HMM was proposed to reflect the security of the network. The proposed method used the output of intrusion detection system as input, classified the alarm events by Snort manual to get the observation sequence, and established the HMM model, the improved Simulated Annealing (SA) algorithm combined with the Baum_Welch (BW) algorithm to optimize the HMM parameters, and used the method of quantitative analysis to get the security situational value of the network. The experimental results show that the proposed method can improve the accuracy and convergence speed of the model.
Reference | Related Articles | Metrics
Network security situational awareness model based on information fusion
LI Fangwei, ZHANG Xinyue, ZHU Jiang, ZHANG Haibo
Journal of Computer Applications    2015, 35 (7): 1882-1887.   DOI: 10.11772/j.issn.1001-9081.2015.07.1882
Abstract652)      PDF (863KB)(721)       Save

Since the evaluation of Distributed Denial of Service (DDoS) is inaccurate and network security situational evaluation is not comprehensive, a new network security situational awareness model based on information fusion was proposed. Firstly, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed; Secondly, the original Common Vulnerability Scoring System (CVSS) was improved and the leak vulnerability was evaluated to make the assessment more comprehensive; Then, according to the combination of objective weight and subjective weight, the method of calculating the combined weights and optimizing the results by Sequence Quadratic Program (SQP) algorithm was raised to reduce the uncertainty of fusion; Finally, the network security situation was got by fusing three aspects evaluation. To verify the original evaluation of DDoS was inaccurate, a testing platform was built and the alarm of the same DDoS differed by 3 orders of magnitude. Compared to the original method based on alarm, the steady and accurate result of evaluation was obtained based on data packet. The experimental results show that the proposed method can improve the accuracy of evaluation results.

Reference | Related Articles | Metrics
Improved network security situational assessment method based on FAHP
LI Fangwei YANG Shaocheng ZHU Jiang
Journal of Computer Applications    2014, 34 (9): 2622-2626.   DOI: 10.11772/j.issn.1001-9081.2014.09.2622
Abstract226)      PDF (894KB)(495)       Save

To minimize damage from network security problem, an improved network security situation assessment model based on Fuzzy Analytic Hierarchy Process (FAHP) was proposed. First, a set of index system in conformity with actual environment which consists of index layer, criterion layer and decision layer was established in consideration of the large-scale network environment in the future. Aiming at the influence on evaluation by data distribution uncertainty and fuzziness in situation assessment, the proposed model used Fuzzy C-Means (FCM) clustering algorithm and the best clustering criterion for data preprocessing to get the optimal cluster number and cluster center. Finally, multi-factor secondary assessment model was established for situation assessment vector. The simulation results show that, compared with the present situation assessment method based on FAHP, the improved method takes the factors which have small weights into consideration better, so the standard deviation is smaller and evaluation results are more objective and accurate.

Reference | Related Articles | Metrics
Linear collusion attack analysis of combined public key cryptosystem
MA Anjun LI Fangwei ZHU Jiang
Journal of Computer Applications    2013, 33 (08): 2225-2227.  
Abstract618)      PDF (456KB)(488)       Save
Concerning the linear collusion attack problem in Combined Public Key (CPK) cryptosystem, on the basis of the nature of the linear collusion attack and according to the principle of key generation, a new equation set was constructed. Through the linear transformation to the coefficient matrix of the equation set, the rank of the equations can be solved, and it is less than the number of seeds of private key seed matrix. At the same time, the analysis of the private key's structure shows that the rank of the augmented matrix is not equal to the rank of coefficient matrix. Thus both sides above prove that the attacker never get the unique solution to the private key seed matrix even if he get all the private keys. Therefore, it demonstrates that there does not exist the threat of linear collusion attack in the CPK cryptosystem.
Reference | Related Articles | Metrics
An Improved Method of Situation Assessment Method Based on Hidden Markov Model
LI Fangwei ZHU Jiang
  
Accepted: 05 December 2016