摘要:Frontier research of networks communication technology has been envisioned as an important topic in researches, where many emerging open problems still be solicited to answer. The ongoing research and development efforts in this extremely innovative field are reflected in this Special Issue on Frontier Research of Networks Communication Technology. After peer review, the guest editors accepted 25 final accepted papers from 96 online submissions for the special issue to reflect the current development of networks communication technology. The first paper “A Video Watermarking Algorithm of H.264/AVC for Content Authentication”, by Weiwei Zhang, Ru Zhang, Xianyi Liu, Chunhua Wu and Xinxin Niu, proposes a content-based authentication semi-fragile watermarking scheme for H.264/AVC video. The experimental results show that the scheme can distinguish the malicious spatial tampering from the common signal processing. The tampered areas can also be located. The second paper is “A Novel Pilot Cancellation Scheme for OFDM Systems in Time-Varying Channels”, authored by Bin Sheng. A novel pilot cancellation scheme for OFDM systems in time-varying channels is proposed, which is implemented by reconstructing the pilot signal in the time domain at receiver and subtracting it before detecting the data signal. Simulation results show that the proposed method performs better than the conventional method in which no pilot cancellation is employed and the gap becomes larger with the increase of the maximum Doppler frequency. In the third paper, “Pilot Power Allocation for OFDM in DAS”, author by Bin Sheng, the issue of distributed antenna system (DAS) is addressed. A novel pilot power allocation strategy for OFDM in DAS is proposed, which is developed based on the criterion of minimizing the mean square error (MSE) of channel estimates at pilot subcarrier across the RAUs. The proposed method only needs the information of large-scale fading at transmitter to allocate power, which makes it feasible in practical OFDM DAS systems. The fourth paper, “Multi-users Cooperative Transmitting Algorithm in Cognitive WLAN”, is authored by Yongli An, Xiaohong Huang, Kaiyu Zhu and Yang Xiao. The authors propose two algorithms to solve the problem of mutual interference between multiple users in cognitive WLAN. These algorithms are based on cooperative transmitting. Results show that the proposed algorithms can support more users to access to the networks simultaneously. The fifth paper is entitled “A Carrier Estimation Method for MF-TDMA Signal Monitoring”, by Xi Liu, Wenquan Feng, Chunsheng Li and Chao Ma. The estimation method for frequency offset and carrier phase is addressed. An effective algorithm is deduced for estimating carrier frequency and phase. The proposed open-loop algorithm demands no preambles and has a wide capture range. The sixth paper “P2P Botnet Detection Using Min-Vertex Cover”, by Lei Xu, XiaoLong Xu and Yue Zhuo, proposes a session-based analysis and minimum vertex cover mining detecting model for core nodes of P2P botnets. This model is focused on solving the core nodes of botnet and has a good performance when the characteristics of botnet are changed to avoid detecting. The seventh paper is “Impact of Feedback on Trust in P2P Networks”, authored by Zhihua Huang, Songnian Lu, Aixin Zhang and Jie Gu. The authors propose a feedback model considering feedback ratio and feedback delay to analyze the effect. Simulation results show that trust systems using implicit feedback can not only effectively isolate normal peers from malicious peers but also provide differential services for normal peers with different behaviors. In the eighth paper, “Network Coding Scheme of Wireless Node with Unequal Data Arriving Rates”, authored by Rui Zhang and Guoliang Ding, an extended network coding schemes on the basis of the Probabilistic Network Coding with Priority (PNCP) method is proposed. The coding node can transmit either network-coded or un-coded packets which are determined by data arrival rates and queue state. The ninth paper, “Semi-supervised Encrypted Traffic classification Using Composite Features Set”, is authored by Huisheng Liu, Zhenxing Wang and Yu Wang. The authors propose composite features-based semi-supervised encrypted traffic classification. The proposed approach is semi-supervised, fast and accurate classifiers can be obtained by training with a small number of labeled flows mixed with large number of unlabeled flows. The tenth paper is entitled “A Prior-based Transfer Learning Method for the Phishing Detection”, by Jianyi Zhang,Yangxi Ou, Dan Li and Yang Xin. A prior-based transfer learning method for the statistical machine learning classifier is proposed, which based on the logistic regression to detect the phishing sites that relies on the selected features of the URLs. The proposed algorithm was evaluated on a real-world task of detecting the phishing websites. The result demonstrates the use of this algorithm in the anti-phishing scenario is feasible and ready for our large scale detection engine. The eleventh paper “Wait-Time-based Multi-channel MAC protocol for Wireless Mesh Networks”, by Hongjiang Lei, Chao Gao, Yongcai Guo, Zhi Ren and Jun Huang, proposes a new multi-channel MAC protocol, named Wait-Time-based Dedicated Control Channel (WTDCC) protocol to solve the CCS problem. Theoretical analysis and simulation results show that the WTDCC can improve the throughput of each data channel, and the common control channel can support negotiation for more data channels. The twelfth paper is “Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks”, authored by Rongrong Fu, Kangfeng Zheng, Tianliang Lu, Dongmei Zhang and Yixian Yang. The authors present an anomaly detection framework by taking the advantages of artificial immune system (AIS) and fuzzy theory. Due to the hierarchical structure and cooperative mechanism, the proposed model shows more advantages in detection performance than conventional method. In the thirteenth paper, “Call Admission Control in CDMA2000/WLAN Network Based on User Position Information”, authored by Jiayin Wang, Yubin Xu, Lin Ma and Liang Chen, a call admission control scheme based on user position information is proposed in the context of CDMA2000 and WLAN heterogeneous networks with voice and data traffic. Simulation results show that UPBAC can always reduce pingpang effect while maintaining the QoS requirements in that it can appropriately admit or reject the users’ admission requests. Also, the UPBAC can achieve lower blocking rate than conventional algorithms such as RSS based algorithm or WLAN first algorithm and can significantly reduce the handoff dropping rate by effective load balancing. The fourteenth paper “A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus”, is authored by Tianliang Lu, Kangfeng Zheng, Rongrong Fu, Yingqing Liu, Bin Wu and Shize Guo. A virus detection model based on the Danger Theory is proposed according to the propagation and destruction characteristics of mobile phone viruses. Due to the distributed and cooperative mechanism of artificial immune system, the proposed model lowers the storage and computing consumption of mobile phones. The simulation results show that based on the mobile phone virus detection model, the proposed virus immunization strategy can effectively inhibit the propagation of mobile phone viruses. The fifteenth paper is entitled “A Seamless Media Stream Delivery Scheme between MSS and UMTS with SIP-based Soft Handover”, by Hongguang Lan, Yilei Sun, Xiaohan Xia, Ming Ma and Jianjun Wu. The authors use the method of extension of RTP and RTCP protocols, modification of terminal buffer size and RTP packet play time to make the service not disrupted during handover. Analysis results demonstrate that this scheme could achieve the seamless media stream handover between MSS and UMTS. The sixteenth paper “Format-Preserving Encryption for Character Data”, by Min Li, Zheli Liu, Jingwei Li and Chunfu Jia. The authors present FPE (Format-preserving Encryption) for character data in both fixed-width and variable-width encoding. The schemes related to NPE and LPE are proposed to encrypt fixed-width and variable-width character data, respectively. The seventeenth paper is “Enable Energy Efficiency of Object Tracking using Sentinel based Multi-sensor Sleep Scheduling”, authored by Tingting Fu, Peng Liu and Y Fun Hu. The authors propose a sentinel based sleep scheduling called Sleep Scheduling Protocol (SSP) to reduce the number of the awakened sensor nodes with less performance loss while existing solutions either suffer from increasing of event detecting delays or computing overhead. The results show that SSP can reduce average energy consumption but with reasonable detection probability and delay. In the eighteenth paper, “Characteristics of Optimal Function for Ontology Similarity Measure via Multi-dividing”, authored by Wei Gao and Tianwei Xu, the issue of ontology is addressed. The authors study the properties of best ontology function for this method. Some results under different loss functions are given. The nineteenth paper, “An Improved Penalty-SA Based Resource Allocation Algorithm for OFDMA cellular systems”, is authored by Qingli Zhao and Weiqiang Pan. An improved Penalty-Simulation Annealing (PSA) resource allocation algorithm is proposed. From the theoretical analysis and simulation results, we observe that the new method can dramatically reduce computational complexity compared with current method without degrading the performance of the whole system. The twentieth paper is entitled “Research on Downstream Encryption Scheme Based on Timestamp in GEPON Network”, by Li Li, Duan De-gong, Li Hong-an and Dong Zhao. A new encryption method based on timestamp function is proposed, which combines AES algorithm with timestamp to form keys for encrypting downstream data. Experimental results show that the method has the advantages of low delay, high throughput and high security compared with the traditional encryption algorithm. The twenty-first paper “A Light-Weight Rainbow Signature Scheme for WSN”, by Min Zhang, Jie Zhang, Zheng-ping Jin, Hua Zhang and Qiao-yan Wen. The authors propose a light-weight rainbow signature (LWRS) scheme based on Shamir's minus method, and the performances has been evaluated with respect to the memory and computation time. At last, the authors give the security analysis of the LWRS scheme. The scheme can resist general attacks, rank reduction attacks and oil-vinegar attacks, etc. The twenty-second paper is “Super-Resolution Information Collection in Underwater Sensor Networks with Random Node Deployment: A Compressed Sensing Approach”, authored by Wenjing Kang and Gongliang Liu.A novel compressed sensing (CS) based information collection scheme is proposed for the large-scale underwater networks. Compared to the traditional data collection methods, the proposed scheme much fewer sensors, as well as less energy consumption and less channel bandwidth, are required to obtain the accurate information map of the same resolution. Mathematical analysis and experiment results both illustrate the validity and efficiency of the proposed scheme, not only for the synthesized scenario but also for the real scenario. In the twenty-third paper, “Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher”, authored by Wei Li, Dawu Gu, Xiaoling Xia,Ya Liu and Zhiqiang Liu, a fault detection of the CLEFIA block cipher in the single-byte fault model is proposed. The result could detect the faults with negligible cost when faults are even injected into the last four rounds. The twenty-fourth paper “Joint Relay Selection and Power Allocation for Cooperative Communication over Frequency Selective Fading Channels”, is authored by Youhua Ma, Zhiyong Liu, Gongliang Liu and Xingpeng Mao. An optimization model combined relay selection and power allocation under a total transmission power budget is formulated. Simulation result shows that the proposed joint scenario with relay selection and power allocation achieves better throughput performance than that of parallel-relay scenario (means that random relay is selected to forward data and allocated part of total power on average). Finally, the twenty-fifth paper is entitled “Power Allocation Algorithm for IDMA-based Multi-Beam Satellite Communication Systems”, by Gongliang Liu, Wenjing Kang, Hongdan Wang, Xin Ge. A novel power allocation algorithm is proposed for the emerging and promising system. Analysis and simulation results show that compared to the traditional power allocation schemes, the proposed scheme can guarantee high power efficiency even in heavy rain attenuation conditions, illustrating the high efficiency of the Chip-by-Chip (CBC) Multi-user Detection (MUD) technique in IDMA.