Loading...

Table of Content

    25 September 2013, Volume 11 Issue 3
    Download the whole issue (PDF)
    The whole issue of ZTE Communications September 2013, Vol. 11 No. 3
    2013, 11(3):  0. 
    Asbtract ( )   PDF (2633KB) ( )  
    Related Articles | Metrics
    Special Topic
    Guest Editorial: Physical Layer Security forWireless and Quantum Communications
    Jinhong Yuan, Yixian Yang, and Nanrun Zhou
    2013, 11(3):  1-2. 
    Asbtract ( )   PDF (211KB) ( )  
    Related Articles | Metrics
    This special issue is dedicated to security problems in wireless and quantum communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security for wireless networks. The second part comprises another four papers on quantum communications.

    Wireless networks have become pervasive in order to guarantee global digital connectivity, and wireless devices have quickly evolved into multimedia smartphones running applications that demand high-speed data connections. Multiuser multiple-input multiple-output (MIMO) wireless techniques meet this demand by achieving high spectral efficiency. Security is also regarded as critical in wireless multiuser networks because users rely on these networks to transmit sensitive data. Because of the broadcast nature of the physical medium, wireless multiuser communication is very susceptible to eavesdropping, and it is essential to protect transmitted information. Wireless communications have traditionally been secured by network layer key-based cryptography. However, in large, dynamic wireless networks, classical cryptography might not be suitable. Classical cryptography tends to cause problems in terms of key distribution and management (for symmetric cryptosystems) and computational complexity (for asymmetric cryptosystems). Moreover, classical cryptography is potentially vulnerable because it relies on the unproven assumption that certain mathematical functions are difficult to invert. Recently, methods have been proposed to provide an additional level of protection and to achieve perfect secrecy without encryption keys. These methods, collectively referred to as physical layer security, exploit the randomness inherent in noisy channels. Physical layer security has been identified as the highest form of security and will be a critical part of future communication networks. The core principle of physical layer security is to restrict the amount of useful information that can be extracted at the symbol/signal level by an unauthorized receiver. This is achieved by carefully designing intelligent and appropriate coding and precoding techniques that exploit the wireless medium’s channel state information. As opposed to classic cryptography, physical layer security is based on information-theoretic principles and does not rely on secret keys or the limited computational capacity of the eavesdropper. Over the past few years, the information-theoretic aspect of secrecy at the physical layer has attracted significant interest and promises to significantly affect both the theory and practical design of future wireless networks.

    In“Location Verification Systems in Emerging Wireless Networks,”Yan and Malaney discuss location-based techniques and applications. They show that in recent years, there has been an explosion of activity related to location-verification techniques in wireless networks. This work has focused on intelligent transport system (ITS) because of the mission-critical nature of vehicle location verification within ITS. The authors review recent research on wireless location verification related to the vehicular networks. In particular, they focus on location verification systems that rely on formal mathematical classification frameworks and show how many systems are either partly or fully encompassed by such frameworks.

    In“Wireless Physical Layer Security with Imperfect Channel State Information: A Survey,”Bao He et al. provide a comprehensive survey of physical layer security in wireless networks with imperfect channel state information (CSI) at communication nodes. The authors describe the main information-theoretic ways that secrecy is measured when CSI is imperfect. They also describe signal processing enhancements for secure transmission. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or cognitive radio systems. The authors discuss the recent development of physical layer security in large, decentralized wireless networks as well as open problems and future research directions.

    In“Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics,”Ali and Sivaraman give an overview of current research on shared secret-key agreement between two parties. This agreement is based on the wireless channel characteristics of the radio. The authors discuss the advantages of shared secret-key agreement over traditional cryptographic mechanisms and describe the theory behind this technique. They also describe the key agreement process, threat model, and typical performance metrics. A shared secret-key agreement comprises four processes: sampling, quantization, information reconciliation, and privacy application. The authors also discuss existing challenges and future research directions.

    In“An Introduction to Transmit Antenna Selection in MIMO Wiretap Channels,”Yang et al. propose transmit antenna selection as a low-complexity, enecgy-efficient way of improving physical layer security in multiple-input multiple-output wiretap channels. The authors describe a general framework for analyzing the exact and asymptotic secrecy of transmit antenna selection. This framework includes receive maximal ratio combining, selection combining, or generalized selection combining. The results show that secrecy is significantly increased when the number of transmit antennas is increased.

    Significant progress has been made in quantum communications as a result of increased support from governments and enterprises. There is a practical need for quantum communication, and it will significantly alter future communications. Quantum cryptography can benefit from the properties of quantum systems, e.g. entangled systems. Quantum entanglement lies at the heart of quantum information processing and communication. For a long time, entanglement was seen merely as a fancy feature that makes quantum mechanics counterintuitive. Quantum information theory has recently shown how quantum correlations are tremendously important to the formulation of new methods of information transfer and for algorithms based on quantum computers. Quantum correlation makes quantum information processing powerful and interesting. In a quantum many-particle system, classifying and quantifying correlations in a multipartite quantum state and determining how much knowledge about the quantum system can be acquired from subsystems are fundamental problems. The main task of quantum information processing and communication is the delivery of quantum states. The main focus of quantum information processing and communication is the delivery of quantum states. A quantum carrier or quantum channel can perform miracles compared with conventional signal processing and communication. In practice, it is very difficult to deliver entangled photons over long distances because of channel loss and detector noise. Quantum error correction coding is necessary for practical, reliable quantum information processing and can be performed in a noisy or real channel or in an imperfect processor.

    In“Reducible Discord in Generic Three-Qubit Pure W States,”Zhihui Li et al. show that quantum correlation in generic three-qubit pure W states can be given by the two-qubit discord of these states. The authors show that reducing discord in the generalized three-qubit pure W state is complicated.

    In“Two-Way Cooperative Quantum Communication with Partial Entanglement Analysis,”Ying Guo et al. describe an improved cooperative two-way quantum communication scheme. This scheme works in a forward-and-backward manner and is based on the five-qubit entangled Brown state. It allows Alice and Bob to simultaneously exchange arbitrary unknown states with the help of trusted Charlie. The authors show how to transfer arbitrary unknown states in a secure cooperative manner using encryption performed by trusted Charlie.

    In “A Coding and Automatic Error-Correction Circuit Based on the Five-Particle Entangled State,”Xiaoqing Zhou et al. propose a quantum-coding and error-correction circuit for the five particle entangled state. This circuit can correct the bit-reversed or phase-flip error of one and two quantum states. The authors also simplify the design of a multiple quantum error-correction circuit.

    In“Optimal Rate for Constant-Fidelity Entanglement in Quantum Communication Networks,”Xutao Yu et al. describe how to achieve constant fidelity entanglement over long distances in quantum networks. The authors discuss the rate capacities of constant fidelity entanglement for both elementary and multihop links. In particular, the authors focus on the rate capacity of constant fidelity entanglement in quantum communication networks when the number of nodes in a multihop link tends towards infinity. The authors draw the concepts of classical ad hoc networks to optimize the rate capacity of one typical structure of a quantum repeater. The rate capacities of the recursive entanglement scheme (simultaneous entanglement scheme) and adjacent entanglement scheme are Ω(1/en ) and Ω(1/n ), respectively.

    We thank all authors for their valuable contributions and all reviewers for their timely and constructive comments on submitted papers. We hope the content of this issue is informative and helpful to all readers.
    Location Verification Systems in Emerging Wireless Networks
    Shihao Yan and Robert Malaney
    2013, 11(3):  3-10.  doi:DOI:10.3939/j.issn.1673-5188.2013.03.001
    Asbtract ( )   PDF (427KB) ( )  
    Related Articles | Metrics
    As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of activity related to location-verification techniques in wireless networks. In particular, there has been a specific focus on intelligent transport systems because of the mission-critical nature of vehicle location verification. In this paper, we review recent research on wireless location verification related to vehicular networks. We focus on location verification systems that rely on formal mathematical classification frameworks and show how many systems are either partially or fully encompassed by such frameworks.
    Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
    Biao He, Xiangyun Zhou, and Thushara D. Abhayapala
    2013, 11(3):  11-19.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.002
    Asbtract ( )   PDF (483KB) ( )  
    Related Articles | Metrics
    Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.
    Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics
    Syed Taha Ali and Vijay Sivaraman
    2013, 11(3):  20-25.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.003
    Asbtract ( )   PDF (417KB) ( )  
    Related Articles | Metrics
    In this article, we give an overview of current research on shared secret-key agreement between two parties. This agreement is based on radio wireless channel characteristics. We discuss the advantages of this approach over traditional cryptographic mechanisms and present the theoretical background of this approach. We then give a detailed description of the key-agreement process and the threat model, and we summarize the typical performance metrics for shared secret-key agreement. There are four processes in shared secret-key agreement: sampling, quantization, information reconciliation, and privacy amplification. We classify prior and current research in this area according to innovation on these four processes. We conclude with a discussion of existing challenges and directions for future work.
    An Introduction to Transmit Antenna Selection in MIMOWiretap Channels
    Nan Yang, Maged Elkashlan, Phee Lep Yeoh, and Jinhong Yuan
    2013, 11(3):  26-32.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.004
    Asbtract ( )   PDF (783KB) ( )  
    Related Articles | Metrics
    This paper is a survey of transmit antenna selection—a low-complexity, energy-efficient method for improving physical layer security in multiple-input multiple-output wiretap channels. With this method, a single antenna out of multiple antennas is selected at the transmitter. We review a general analytical framework for analyzing exact and asymptotic secrecy of transmit antenna selection with receive maximal ratio combining, selection combining, or generalized selection combining. The analytical results prove that secrecy is significantly improved when the number of transmit antennas increases.
    Reducible Discord in Generic Three-Qubit Pure W States
    Zhengjun Xi, Zhihui Li, and Yongming Li
    2013, 11(3):  33-35.  doi:DOI:10.3939/j.issn.1673-5188.2013.03.005
    Asbtract ( )   PDF (353KB) ( )  
    Related Articles | Metrics
    Quantum discord is the most prominent of quantum correlations, but it does not have unique generalizations to the multipartite case. W states are especially useful for secure communication. In this paper, we propose that the quantum correlation in generic three-qubit pure W states can be given by the two-qubit discords of these states.
    Two-Way Cooperative Quantum Communication with Partial Entanglement Analysis
    Yunkai Deng, Zhujun Gao, and Ying Guo
    2013, 11(3):  36-40.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.006
    Asbtract ( )   PDF (404KB) ( )  
    Related Articles | Metrics
    In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown state allows for the simultaneous exchange of arbitrary unknown states between Alice and Bob (with the help of trusted Charlie). Security is guaranteed because opposing unknown states are transmitted by performing the suitable recovery operations in a deterministic way or, in the case of irregularities, no results are generated. The current two-way quantum communication scheme can also be extended to transmit arbitrary unknown states. This is done in a probabilistic way by using two-way quantum teleportation based on the generalized Brown-like state.
    A Coding and Automatic Error-Correction Circuit Based on the Five-Particle Entangled State
    Xi Chen, Pei Zhang, and Xiaoqing Zhou
    2013, 11(3):  41-45.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.007
    Asbtract ( )   PDF (388KB) ( )  
    Related Articles | Metrics
    In this paper, we discuss the concepts of quantum coding and error correction for a five-particle entangled state. Error correction can correct bit-reverse or phase-flip errors of one and two quantum states and is no longer limited to only one quantum state. We encode a single quantum state into a five-particle entangled state before being transferred to the sender. We designed an automatic error-correction circuit to correct errors caused by noise. We also simplify the design process for a multiple quantum error-correction circuit. We compare error-correction schemes for five and three entangled particles in terms of efficiency and capabilities. The results show that error-correction efficiency and fidelity are improved.
    Optimal Rate for Constant-Fidelity Entanglement in Quantum Communication Networks
    Youxun Cai, Xutao Yu, and Yang Cao
    2013, 11(3):  46-50.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.008
    Asbtract ( )   PDF (379KB) ( )  
    Related Articles | Metrics
    In this paper, we propose an entanglement scheme for long-distance, constant-fidelity communication in quantum networks. We discuss the optimal rate of entanglement that allows for constant fidelity in both elementary and multihop links. We also discuss time complexity and propose the mathematical order of the rate capacity for an entanglement scheme. We propose a recursive entanglement scheme, a simultaneous entanglement scheme, and an adjacent entanglement scheme mathematically analyze these schemes. The rate capacity of the recursive and simultaneous entanglement schemes is Ω(1/en ), but the adjacent entanglement scheme performs better, providing a rate of Ω(1/n ).
    Research Paper
    IVI/MAP-T/MAP-E: Unified IPv4/IPv6 Stateless Translation and Encapsulation Technologies
    Congxiao Bao and Xing Li
    2013, 11(3):  51-55.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.009
    Asbtract ( )   PDF (363KB) ( )  
    Related Articles | Metrics
    Stateless translation and stateless double translation/encapsulation technologies (IVI/MAP-T/MAP-E) define the address mapping and protocol translation/encapsulation algorithms between IPv4 and IPv6. IVI/MAP-T/MAP-E technologies maintain end-to-end address transparency between IPv4 and IPv6 and support communication initiated by IPv4-only or IPv6-only end systems. Therefore, they are the very critical techniques for the IPv4/IPv6 coexistence and transition.
    A Parallel Platform for Web Text Mining
    Ping Lu, Zhenjiang Dong, Shengmei Luo, Lixia Liu, Shanshan Guan, Shengyu Liu, and Qingcai Chen
    2013, 11(3):  56-61.  doi:DOI:10.3969/j.issn.1673-5188.2013.03.010
    Asbtract ( )   PDF (411KB) ( )  
    Related Articles | Metrics
    With user-generated content, anyone can be a content creator. This phenomenon has infinitely increased the amount of information circulated online, and it is becoming harder to efficiently obtain required information. In this paper, we describe how natural language processing and text mining can be parallelized using Hadoop and Message Passing Interface. We propose a parallel web text mining platform that processes massive amounts of data quickly and efficiently. Our web knowledge service platform is designed to collect information about the IT and telecommunications industries from the web and process this information using natural language processing and data-mining techniques.