Loading...

Table of Content

    31 March 2019, Volume 37 Issue 2
    Blockchain
    The State-of-the-Art Blockchain Applications in Finance: Progress and Trends
    LI Bo, ZHENG Bo, GUO Zi-yang, WANG Hong-zhi
    2019, 37(2):  151-163.  doi:10.3969/j.issn.0255-8297.2019.02.001
    Asbtract ( 1084 )   PDF (2398KB) ( 336 )  
    References | Related Articles | Metrics
    Blockchain is a kind of value peer-to-peer network that uses distributed database to exchange, disseminate and record information. With its rapid development, it has attracted high attention from national departments, fnancial institutions, technology enterprises, capital markets and investors. The decentralization, transparency, non-tampering and other characteristics of blockchain technology make the transfer of value no longer require the central trust institution to endorse. These characteristics deserve the high attention of the fnancial industry. And apply its architecture to transform existing types such as information asymmetry defects and problems with data authenticity. This paper analyzes legal currency, cross-border payment, digital bills, supply chain fnance and securities trading in detail by deconstructing the core elements of the blockchain and combining with the current the latest research results and application. Blockchain is introduced for restore trust in the fnancial sector, blockchain technology is discussed in the current application and future development trend, we hope this work can provide helpful guidance and reference for future related research.
    Two-Factor Identity Authentication Model Based on Blockchain and Face Recognition
    LÜ Jing-shu, CAO Xiao-chun, YANG Pei
    2019, 37(2):  164-178.  doi:10.3969/j.issn.0255-8297.2019.02.002
    Asbtract ( 1426 )   PDF (6435KB) ( 367 )  
    References | Related Articles | Metrics
    Blockchain's core features are “decentralized” and “non-real-name,” so blockchain technology is well suited for authentication scenarios. Firstly, this paper expounds the history and principle of identity authentication and blockchain development. Secondly, it points out the security problems of traditional identity authentication mechanism due to centralized storage. On this basis, it also put forward two-factor identity authentication model based on blockchain and face recognition, defnes and describes the participants and components of the model, details the specifc processes of each operation involved in the model. Finally, the security of the model is proved by simulating attack and resistance analysis, and the availability of the model is proved by efciency and storage analysis.
    Realization of Privacy Protection of Food Supply Chain Based on Blockchain and IPFS
    FAN Xian-li, FAN Chun-xiao, WU Yue-xin
    2019, 37(2):  179-190.  doi:10.3969/j.issn.0255-8297.2019.02.003
    Asbtract ( 1298 )   PDF (9996KB) ( 356 )  
    References | Related Articles | Metrics
    Aiming at the privacy issues faced by individuals in the sharing of information in the food supply chain, this paper designs and implements a privacy protection system based on blockchain and interplanetary fle system (IPFS). The system uses the blockchain to store the hash value of the encrypted private information and the permission access control policy set by the user, while the real private information is stored in the IPFS after being encrypted, which ensures the effective control of users to their own information while realizing the storage of privacy information security. In order to achieve flexible privilege management, the system classifes the privacy information; and in order to improve access transparency and encourage users to share their privacy information, the system also designs an integral scheme.
    Public Opinion Propagation Model in Social Network Based on Blockchain
    BIN Sheng, SUN Geng-xin, ZHOU Shuang
    2019, 37(2):  191-202.  doi:10.3969/j.issn.0255-8297.2019.02.004
    Asbtract ( 1141 )   PDF (5957KB) ( 267 )  
    References | Related Articles | Metrics
    With the emergence and development of blockchain technology, a new type of social networks based on blockchain had emerged. Due to the transparency and traceability brought by blockchain technology, the public opinion propagation in such social networks presents new characteristics and laws. Based on the theory of network propagation and blockchain, a new public opinion propagation model for the kind of social network based on blockchain technology is proposed in this paper. The model considers the effect of incentive mechanism produced by reasonably quantifying value contribution on the propagation of information in such social networks, and the income-risk matrix under different propagation behaviors is constructed. Furthermore, the transformation process and transfer probability among different states in the propagation model are defned on the basis of income-risk matrix. In the experimental simulation, through the analysis of the value of forwarding probability, the influence of incentive mechanism on information propagation in block-chain social network is illustrated. Through the influence of stable strategy of income-risk matrix on forwarding probability, the model is proved to be helpful to break the bottleneck of network public opinion management, the propagation of false network public opinion can be contained, and a good ecological environment of network public opinion propagation would be realized.
    Side Channel Security Analysis of Elliptic Curve Cryptography of Blockchain
    WAN Wu-nan, CHEN Hao, CHEN Jun, ZHANG Shi-bin
    2019, 37(2):  203-212.  doi:10.3969/j.issn.0255-8297.2019.02.005
    Asbtract ( 899 )   PDF (6209KB) ( 152 )  
    References | Related Articles | Metrics
    Blockchain is an emerging distributed computing technology of de-centralization that uses cryptography to ensure integrity, anonymity, privacy and immutability, and the computational effciency of consensus mechanism has become one of the bottlenecks of hindering its development, so the hardware devices of the blockchain have emerged. However, the side channel attack has become one of the main attack means of cryptographic hardware devices, and the hardware devices of the blockchain will face side channel attacks. The power feature model of atomic operations is proposed by exploring the implementation of point doubling and addition operations at atomic level in scalar multiplication. The practical SPA method is presented with the power feature model and the private key can be cracked with a power trace. Next, the paper analyzes the major cause of power difference between point doubling and addition operations from atomic operations, and the countermeasure of equivalent power consumption at atomic level is given by adding empty operations in point doubling and addition operations. This is given to secure cryptography technology against side channel attacks for hardware devices of blockchain. Finally, the research results are summarized and a perspective of the future work in this research area is discussed in this paper.
    DDoS Defense Method of IoT Devices Based on Blockchain
    HOU Qi-hui, DENG Zu-qiang, ZOU Ping, WANG Qiu-sheng, LI Yan-dong, JIANG Hai-sen
    2019, 37(2):  213-223.  doi:10.3969/j.issn.0255-8297.2019.02.006
    Asbtract ( 1382 )   PDF (5614KB) ( 253 )  
    References | Related Articles | Metrics
    With the popularity of internet of things (IoT) devices, distributed denial of service (DDoS) attacks initiated by IoT devices have become ferce. To solve such problems, this paper proposes a detection and defense architecture based on edge computing and blockchain. According to the business characteristics of IoT devices, the suspected DDoS anomaly detection is implemented at edge nodes. Then the DDoS warning is obtained by sharing and analyzing the preliminary results with blockchain. Finally, DDoS connection is fltered at edge nodes based on the reward mechanism. The detection and defense is deployed at the source distributely, which can avoid high cost and network congestion caused by trafc extraction and cleaning, and can prevent the increasement of total DDoS trafc by fltering the trafc continuously at the source when DDoS is detected.
    Logistics Information Privacy Protection Based on Blockchain and Hierarchical Encryption
    ZHAO Ling-qi, SONG Yu-bo, ZHANG Ke-luo, HU Ai-qun, LUO Jian
    2019, 37(2):  224-234.  doi:10.3969/j.issn.0255-8297.2019.02.007
    Asbtract ( 1253 )   PDF (2645KB) ( 527 )  
    References | Related Articles | Metrics
    In the contemporary logistics industry, user privacy data is usually kept by third parties, which often lead to users lack control over logistics information data. This paper proposes a novel logistics user privacy protection scheme based on layered encryption and blockchain technology. The scheme proposes a novel access rights management mechanism based on blockchain and DAA anonymous authentication to implement the privacy data access rights management and the traceability of private data access records. In addition, the scheme adopts a nested access control tree structure enables users to determine the access rights of their private data according to the attributes of the data accessor. Finally, this paper designs and implements a logistics order proofng verifcation system. The security analysis shows that the system can ensure the security of private data efciently.
    Anti-phone Harassment Fraud Model Based on Blockchain
    LI Na, CHEN Fu, MAO Guo-jun, ZHU Jian-ming, HUANG Yong-feng
    2019, 37(2):  235-243.  doi:10.3969/j.issn.0255-8297.2019.02.008
    Asbtract ( 1159 )   PDF (5369KB) ( 198 )  
    References | Related Articles | Metrics
    In order to prevent telephone harassment and fraud phenomenon, this paper proposes an anti-phone harassment fraud model based on blockchain. This model has the characters like centralization, transparency, tamper-proof information, anonymity and historical trace-ability by dividing the labor among the participants on the blockchain and using the union chain and the hybrid consensus mechanism algorithm to achieve the security and the high efciency data storage and sharing. In addition, the advantages and effects of this model are analyzed by comparing the existing problems in the research of anti-phone harassment fraud.
    User Trust Negotiation Model Based on Two-Layer Blockchain in Heterogeneous Alliance System
    YANG Min, ZHANG Shi-bin, ZHANG Hang, LIU Ning, GAN Bo
    2019, 37(2):  244-252.  doi:10.3969/j.issn.0255-8297.2019.02.009
    Asbtract ( 1190 )   PDF (3020KB) ( 296 )  
    References | Related Articles | Metrics
    In order to break the ‘information island' effect formed by traditional isolated and decentralized systems, and ensure the credibility and security of user-related information in heterogeneous alliance systems, an alliance system user trust negotiation model based on two-layer blockchain is proposed in this paper. The model uses the blockchain technology to protect the user behavior data from tampering, and forms a user behavior data blockchain (ie, the frst layer of blockchain). Based on these behavioral data, the user's trust value can be calculated to form a user trust blockchain (ie, the second layer of blockchain). Through simulation experiments and security analysis, it demonstrates that the user behavior data and trust value cannot be falsifed through the proposed model, as well as the related information can be safely shared in the heterogeneous alliance system.
    Communication Engineering
    Demonstration Setup of Light Wave-Particle Duality Based on Optical Trapping Principle
    ZHANG Min, LIU Chao, LIU Zhi-hai, ZHANG Yu
    2019, 37(2):  253-260.  doi:10.3969/j.issn.0255-8297.2019.02.010
    Asbtract ( 1209 )   PDF (12099KB) ( 140 )  
    References | Related Articles | Metrics
    In this paper, the optical fber tweezers technology is frstly applied to the light wave-particle duality demonstration experiment device to realize the simultaneous demonstration of optical wave property and particle property. Based on optical trapping technology, the device achieved the three-dimensional spatial capture, orientation and manipulation of particles, which reflects the particle property of light. The beams reflected from the fber end and the trapped particle surface can interfere. Based on the interferometry technology, the device achieved the record and detection of the interferometric signals, which reflects the wave property of light. The device is low in cost, small in size, and highly integrated.
    Multipath TCP Scheduling Optimization Based on PSRBP in Vehicular Heterogeneous Network
    ZHANG Meng-kang, ZHAO Hai-tao, YU Hong-su, MAO Tian-qi, ZHU Hong-bo
    2019, 37(2):  261-270.  doi:10.3969/j.issn.0255-8297.2019.02.011
    Asbtract ( 927 )   PDF (9850KB) ( 81 )  
    References | Related Articles | Metrics
    Nowadays, as a variety of network interfaces are deployed in vehicles for a heterogeneous vehicular network, the diversity of interfaces leads to a noticeable difference in characteristics between transmission paths. When the vehicular heterogeneous network uses the multipath transmission control protocol (MPTCP) for transmission, it may causes blocking problem in the receive buffer due to the differences between paths, resulting in poor MPTCP transmission performance. For MPTCP receives buffer blocking problem, this paper proposes an MPTCP path scheduling optimization method based on path selection and receive buffer prediction (PSRBP). This method introduces a throughput prediction model, then introduces the similarity parameter between each path and the maximum throughput path. The similarity parameter is compared with a predetermined threshold to select a path that can be transmitted using MPTCP. After that, the proposed algorithm predicts the buffer congestion problem by calculating the number of out-of-ordered packets, then stops data transmission through the bad paths to improve the performance of MPTCP. Simulation results show that the algorithm can improve the overall system throughput and improve the network utilization.
    A Two Layer Low Power Wireless Sensor Network without Router
    ZHANG Xue-fan, LIU Yuan, LI Hong
    2019, 37(2):  271-281.  doi:10.3969/j.issn.0255-8297.2019.02.012
    Asbtract ( 818 )   PDF (6598KB) ( 79 )  
    References | Related Articles | Metrics
    In a wireless sensor network with limited energy, node sleep and data forwarding between nodes are a pair of contradictions. Wireless star network is both energy efcient and easy to control, but the network size is small. This paper presents an energy-efcient transfer method without a special router, the star network is extended into an internal and external two layer structure. So the control area increases to four times that of the star type. The following methods are used: 1) The topology control algorithm divides the network nodes into internal and external two layers with the center of the controller as the center. Inner layer nodes are used as routers by outer layer nodes. It simplifes routing and optimizes routing energy consumption. 2) Energy saving timing control. First, the nodes use the sequence of time segments from sleep to revival, reducing the listening time and the consumption of the current. Secondly, the short time monitoring of the inner node is coordinated with the transmission sequence of the outer node. It can not only realize the low energy communication in the normal state, but also solve the fast response in the emergency state. Test and simulation results show that the two level low power wireless network and its control method proposed in this paper are feasible, and its low power consumption and network delay characteristics meet the design requirements.
    Signal and Information Processing
    Semantic Segmentation of High-Resolution Remote Sensing Image Based on Deep Residual Network
    LI Xin, TANG Wen-li, YANG Bo
    2019, 37(2):  282-290.  doi:10.3969/j.issn.0255-8297.2019.02.013
    Asbtract ( 1528 )   PDF (10455KB) ( 130 )  
    References | Related Articles | Metrics
    As an important part of image interpretation and analysis, segmentation of remote sensing images has been widely researched. However, traditional segmentation method based on hand-crafted features has its limitations on accuracy and generalization, state-of-the-art methods are mainly relied on deep learning in recent years. In this paper, we propose a new segmentation method based on multi-scale deep residual neural networks, which aims at improving segmentation accuracy, especially on small-scale objects. We frstly utilize Residual Network (ResNet) and transform it to fully convolution networks (FCN), in which, Atrous convolution is introduced during the up-sampling process to ensure the feld of view on each layer. Then we add multi-scale data augmentation to improve the robustness for small objects. The proposed approach is applied on ISPRS 2D Vaihingen semantic labeling contest dataset, and yields high accuracy at 89.7%, outperforming most state-of-the-art methods.
    Copy-Move Forgery Detection for Color Images Based on QPCA
    WANG Jin-wei, XU Chun-hui
    2019, 37(2):  291-300.  doi:10.3969/j.issn.0255-8297.2019.02.014
    Asbtract ( 801 )   PDF (7146KB) ( 95 )  
    References | Related Articles | Metrics
    Currently, in order to deal with color images, most forensics methods transform color images into gray images,which results in the color property not being fully used. Aimed at this problem, a copy-move forgery detection scheme based on quaternion principal component analysis (QPCA) is proposed in this paper. The scheme makes full use of the color property and the relationship among all color channels, which improves the accuracy in forged area effectively. The proposed scheme is block-based and frstly it divides images into overlapping blocks and performs QPCA of all the blocks to extract features. Then the features are lexicographical ordered to obtain shift vector and its frequency. Finally we compare the shift vector frequency to the threshold to locate the forged region. Experiments show that the missing-false alarm rate in the proposed method is lower than the existing methods and has a better accuracy.