Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
MetaOracle: A High-Throughput Decentralized Oracle for Web 3.0-Empowered Metaverse
CHEN Rui, LI Hui, LI Wuyang, BAI He, WANG Han, WU Naixing, FAN Ping, KANG Jian, DENG Selwyn, ZHU Xiang
ZTE Communications    2024, 22 (2): 11-18.   DOI: 10.12142/ZTECOM.202402003
Abstract6)   HTML0)    PDF (1003KB)(2)       Save

Recent rapid advancements in communication technology have brought forth the era of Web 3.0, representing a substantial transformation in the Internet landscape. This shift has led to the emergence of various decentralized metaverse applications that leverage blockchain as their underlying technology to enable users to exchange value directly from point to point. However, blockchains are blind to the real world, and smart contracts cannot directly access data from the external world. To address this limitation, the technology of oracles has been introduced to provide real-world data for smart contracts and other blockchain applications. In this paper, we focus on mitigating the risks associated with oracles providing corrupt or incorrect data. We propose a novel Web 3.0 architecture for the Metaverse based on the multi-identifier network (MIN), and its decentralized blockchain oracle model called MetaOracle. The experimental results show that the proposed scheme can achieve minor time investment in return for significantly more reliable data and increased throughput.

Table and Figures | Reference | Related Articles | Metrics
Efficient Bandwidth Allocation and Computation Configuration in Industrial IoT
HUANG Rui, LI Huilin, ZHANG Yongmin
ZTE Communications    2023, 21 (1): 55-63.   DOI: 10.12142/ZTECOM.202301007
Abstract21)   HTML0)    PDF (1130KB)(15)       Save

With the advancement of the Industrial Internet of Things (IoT), the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario. Taking advantage of improved model accuracy by machine learning algorithms, we investigate the inner relationship of system performance and data transmission and computation resources, and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper. A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker (KKT) conditions are used to get an optimal bandwidth allocation and computation configuration decision, which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements. Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10% when compared to the average allocation strategy.

Table and Figures | Reference | Related Articles | Metrics
Differentially Authorized Deduplication System Based on Blockchain
ZHAO Tian, LI Hui, YANG Xin, WANG Han, ZENG Ming, GUO Haisheng, WANG Dezheng
ZTE Communications    2021, 19 (2): 67-76.   DOI: 10.12142/ZTECOM.202102009
Abstract57)   HTML2)    PDF (966KB)(39)       Save

In architecture of cloud storage, the deduplication technology encrypted with the convergent key is one of the important data compression technologies, which effectively improves the utilization of space and bandwidth. To further refine the usage scenarios for various user permissions and enhance user’s data security, we propose a blockchain-based differential authorized deduplication system. The proposed system optimizes the traditional Proof of Vote (PoV) consensus algorithm and simplifies the existing differential authorization process to realize credible management and dynamic update of authority. Based on the decentralized property of blockchain, we overcome the centralized single point fault problem of traditional differentially authorized deduplication system. Besides, the operations of legitimate users are recorded in blocks to ensure the traceability of behaviors.

Table and Figures | Reference | Related Articles | Metrics
Identifier Management of IndustrialInternet Based on Multi-Identifier Network Architecture
WANG Yunmin, LI Hui, XING Kaixuan, HOU Hanxu, HAN Yunghsiang S., LIU Ji, SUN Tao
ZTE Communications    2020, 18 (1): 36-43.   DOI: 10.12142/ZTECOM.202001006
Abstract105)   HTML111)    PDF (1661KB)(81)       Save

The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection. The industrial Internet identifier is the core element to accomplish this task. The traditional industrial Internet identifier resolution technologies depend excessively on IP networks, and cannot meet the requirements of ubiquitous resource-restraint Internet of Things (IoT) devices. An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper, which supports content names, identities, locations, apart from the traditional IP address. The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion, but also enhances the security, credibility, and availability of the industrial Internet identification resolution system. An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones. We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.

Table and Figures | Reference | Related Articles | Metrics
Prototype of Multi-Identifier SystemBased on Voting Consensus
XING Kaixuan, LI Hui, YIN Feng, MA Huajun, HOU Hanxu, XU Huanle, HAN Yunghsiang S., LIU Ji, SUN Tao
ZTE Communications    2020, 18 (1): 7-17.   DOI: 10.12142/ZTECOM.202001003
Abstract93)   HTML14)    PDF (3010KB)(112)       Save

With the rapid development of the Internet, the expansion of identifiers and data brings a huge challenge to the network system. However, the network resources such as Domain Name System (DNS) are monopolized by a single agency which brings a potential threat to cyberspace. The existing network architecture cannot fundamentally solve the problems of resource monopoly and low performance. Based on the blockchain, this paper designs and implements a new Multi-Identifier System (MIS), providing the analysis and management for different identifiers in the multi-identifier network. Our preliminary emulation results prove the correctness and efficiency of the algorithm. Besides, the prototype system of MIS has been tested on the real operators’ network, realizing the function of co-governing, security supervision and data protection.

Table and Figures | Reference | Related Articles | Metrics
Editorial: Special Topic onDomain Name and Identifier of Internet : Architecture & Systems
Li Hui
ZTE Communications    2020, 18 (1): 5-6.   DOI: 10.12142/ZTECOM.202001002
Abstract131)   HTML31)    PDF (271KB)(112)       Save
Reference | Related Articles | Metrics
A Service-Based Intelligent Time-Domain and Spectral-Domain Flow Aggregation in IP-over-EON Based on SDON
NI Dong, LI Hui, JI Yuefeng, LI Hongbiao, ZHU Yinan
ZTE Communications    2019, 17 (3): 56-62.   DOI: 10.12142/ZTECOM.201903009
Abstract98)   HTML31)    PDF (405KB)(78)       Save

The rapid growth of IP traffic has contributed to wide deployment of optical devices in elastic optical network. However, the passband shape of wavelength selective switches (WSSs) that are used in reconfigurable optical add-drop multiplexer (ROADM)/optical cross connect (OXC) is not ideal, causing the narrowing of spectrum. Spectral narrowing will lead to signal impairment. Therefore, guard-bands need to be inserted between adjacent paths which will cause the waste of resources. In this paper, we propose a service-based intelligent aggregation node selection and area division (ANS-AD) algorithm. For the rationality of the aggregation node selection, the ANS-AD algorithm chooses the aggregation nodes according to historical traffic information based on big data analysis. Then the ANS-AD algorithm divides the topology into areas according to the result of the aggregation node selection. Based on the ANS-AD algorithm, we propose a time-domain and spectral-domain flow aggregation (TS-FA) algorithm. For the purpose of reducing resources’ waste, the TS-FA algorithm attempts to reduce the insertion of guard-bands by time-domain and spectral-domain flow aggregation. Moreover, we design a time-domain and spectral-domain flow aggregation module on software defined optical network (SDON) architecture. Finally, a simulation is designed to evaluate the performance of the proposed algorithms and the results show that our proposed algorithms can effectively reduce the resource waste.

Table and Figures | Reference | Related Articles | Metrics
DexDefender: A DEX Protection Scheme to Withstand Memory Dump Attack Based on Android Platform
RONG Yu, LIU Yiyi, LI Hui, WANG Wei
ZTE Communications    2018, 16 (3): 45-51.   DOI: 10.19729/j.cnki.1673-5188.2018.03.008
Abstract200)   HTML51)    PDF (457KB)(221)       Save

Since Dalvik Executable (DEX) files are prone to be reversed to the Java source code using some decompiling tools, how to protect the DEX files from attackers becomes an important research issue. The traditional way to protect the DEX files from reverse engineering is to encrypt the entire DEX file, but after the complete plain code has been loaded into the memory while the application is running, the attackers can retrieve the code by using memory dump attack. This paper presents a novel DEX protection scheme to withstand memory dump attack on the Android platform with the name of DexDefender, which adopts the dynamic class-restoration method to ensure that the complete plain DEX data not appear in the memory while the application is being loaded into the memory. Experimental results show that the proposed scheme can protect the DEX files from both reverse engineering and memory dump attacks with an acceptable performance.

Table and Figures | Reference | Related Articles | Metrics
SeSoa: Security Enhancement System with Online Authentication for Android APK
DONG Zhenjiang, WANG Wei, LI Hui, ZHANG Yateng, ZHANG Hongrui, ZHAO Hanyu
ZTE Communications    2016, 14 (S0): 44-50.   DOI: 10.3969/j.issn.1673-5188.2016.S0.005
Abstract133)      PDF (476KB)(71)       Save
Android OS provides such security mechanisms as application signature, privilege limit and sandbox to protect the security of operational system. However, these methods are unable to protect the applications of Android against anti-reverse engineering and the codes of such applications face the risk of being obtained or modified, which are always the first step for further attacks. In this paper, a security enhancement system with online authentication (SeSoa) for Android APK is proposed, in which the code of Android application package (APK) can be automatically encrypted. The encrypted code is loaded and run in the Android system after being successfully decrypted. Compared with the exiting software protecting systems, SeSoa uses online authentication mechanism to ensure the improvementof the APK security and good balance between security and usability.
Related Articles | Metrics