Caidan Zhao
Xiamen University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Caidan Zhao.
international conference on wireless communications, networking and mobile computing | 2009
Caidan Zhao; Wumei Wang; Lianfen Huang; Yan Yao
Cognitive Radio (CR) is regarded as one of the best options to solve the problem of low spectrum utilization. However, information security of CR limits its wide application. Most of the known security schemes are aiming at the location verification for incumbent transmitter, but it is not available for Ad hoc. In this paper, a new security scenario in physical layer is proposed. It takes advantage of the fingerprint verification of the transmitter against primary user emulation (PUE) attacks. The phase noise of the noisy carrier is extracted from the received modulated signal and directly applied to identify the transmitter.
communications and mobile computing | 2010
Caidan Zhao; Liang Xie; Xueyuan Jiang; Lianfen Huang; Yan Yao
Cognitive radio (CR) was proposed as the key technologies to achieve the secondary usage of the spectrum. The security problems of CR networks have not been intensively studied, such as the primary user emulation (PUE) attacks. In this paper, we study the non-interactive security issues for wireless networks and propose a physical layer authentication approach to prevent PUE attacks in CR networks. We extract transmitter location fingerprints from the wireless medium in the multipath propagation environment. Wavelet transform is used to extract the characteristics of these fingerprints. Simulation and experiment results show that our approach can identify the PUE attackers and the legitimate primary users effectively.
international conference on computer science and education | 2011
Caidan Zhao; Lianfen Huang; Liting Hu; Yan Yao
With the rapid development of cognitive radio network (CRN), the information security has become a primary concern. In this paper, transient fingerprinting is incorporated into CRN for detecting Primary User Emulation (PUE) attacks. A novel approach is proposed to extract transient fingerprint feature of transmitters. The energy envelope obtained from the instantaneous signal by spectrogram analysis, is fitted according to the least square estimation. The polynomial coefficients are selected as the feature vectors of instantaneous signal. A data acquisition system is designed to capture IEEE802.11b signals in the 2.4GHz ISM band. The results of data analysis indicate that it greatly improves the performance of detecting different brand of WLAN cards.
IEEE Wireless Communications | 2017
Caidan Zhao; Lianfen Huang; Yifeng Zhao; Xiaojiang Du
Machine-type communication is undergoing ubiquitous development by connecting with trillions of intelligent devices and providing a broad range of applications through all of our lives. MTC can access different networks, which is similar to a fusion of heterogeneous networks, including LTE, WiFi, ZigBee, and so on. However, security and privacy issues still bring about a great challenge for the development of MTC, particularly secure transmission under heterogeneous networks. This article first presents an overview of the MTC architecture and its evolution toward LTE, security threats, and solutions. Then, as 5G systems have been designed to support a diverse set of communications, we propose a scalable cross-layer authentication solution based on MTC devices’ hardware fingerprints toward an LTE heterogeneous network.
Multimedia Tools and Applications | 2015
Wei-Jian Xu; Caidan Zhao; Hua-Pei Chiang; Lianfen Huang; Yueh-Min Huang
The reduced-reference video quality evaluation method uses only partial reference video information to evaluate the quality of deteriorated videos. This method can evaluate the quality of a video in real-time because less transmission bandwidth is required. Because the video active area attracts significant human eye attention, any deterioration in the active area will directly affect video evaluation results. Given the advantage of reduced reference model in VQM (Video Qualify Metric), this paper proposes a reduced reference evaluation model named RR-PEVQ (Reduced Reference Perceptual Evaluation of Video Quality) for weighting the active video area. According to the experimental results, the RR-PEVQ evaluation score is similar to that of the full reference PEVQ and the proposed method’s practicability is greatly improved for big data purposes.
The Scientific World Journal | 2014
Caidan Zhao; Xiongpeng Wu; Lianfen Huang; Yan Yao; Yao-Chung Chang
Most of the existing fingerprint identification techniques are unable to distinguish different wireless transmitters, whose emitted signals are highly attenuated, long-distance propagating, and of strong similarity to their transient waveforms. Therefore, this paper proposes a new method to identify different wireless transmitters based on compressed sensing. A data acquisition system is designed to capture the wireless transmitter signals. Complex analytical wavelet transform is used to obtain the envelope of the transient signal, and the corresponding features are extracted by using the compressed sensing theory. Feature selection utilizing minimum redundancy maximum relevance (mRMR) is employed to obtain the optimal feature subsets for identification. The results show that the proposed method is more efficient for the identification of wireless transmitters with similar transient waveforms.
Intelligent Automation and Soft Computing | 2014
Caidan Zhao; Lianfen Huang; Zilong Gao; Sha-Li Zhou; Dan Guo; Han-Chieh Chao
Multiple antenna technology for wireless communications is becoming mature and wide ranging in the wireless broadband network. Many spectrum usage measurement reports have shown that inaccurate spectrum sensing will waste spectrum resources. A Multiple Antenna Asynchronous Cognitive MAC (MAAC-MAC) protocol is proposed through introducing a multiple antenna architecture and power control mechanism into the hardware-constrained cognitive MAC (MHC-MAC) protocol with Asynchronous-Assembly Line Mode in cognitive radio network. In the spectrum sensing stage, the protocol makes use of multiple antennas to perform spectrum sensing and positioning, aimed at improving spectrum sensing and detection performance. During the negotiation phase, the CU (Cognitive User) access power control mechanism fully utilizes the licensed band without interfering PU (Primary User) and also increases the transmission rate and system throughput. It may be used for improved positioning and location-based services both indoors and outd...
international conference on signal processing | 2013
Lianfen Huang; Minghui Gao; Caidan Zhao; Xiongpeng Wu
Algorithms used to detect Wi-Fi transmitter transients are discussed in this paper, and the start of a Wi-Fi transmitter transient, in our opinion, has a new definition. Current algorithms, namely Variance Fractal Dimension Threshold Detection, Bayesian Step Change Detection and Phase Detection are analyzed at the beginning of this article. According to the disadvantages such as complexity, accuracy and a threshold needed in the final determination of these traditional methods, an improved algorithm based on Mean Change Point Detection is put forward. Threshold for determination and nonparametric estimation for hypothesis test are not needed in our improved approach, it detects the start of transient only by calculating the maximum of the difference of statistic. Moreover, the experimental results show that this improved method outperforms the other three methods, particularly in the case of low SNR.
international conference on signal processing | 2013
Lianfen Huang; Xiongpeng Wu; Caidan Zhao; Minghui Gao
Recently, radio individual identification draws the attention of related research institutions because of its great significance in various fields. In this paper, transient envelope feature is applied to the identification of radio transmitters. A novel approach is proposed to extract the transient envelope feature of radio transmitters based on fitting. According to the characteristics of the radio signal, the transient envelope obtained from the signal by complex analytical wavelet transform, is fitted by Gaussian function and sinusoidal function. The fitting coefficients regarded as feature vector are used for individual identification. The results of data analysis indicate that both Gaussian fitting and sinusoidal fitting have a good recognition performance of identifying different radio transmitters.
Wireless Communications and Mobile Computing | 2013
Caidan Zhao; Ting-Yun Chi; Lianfen Huang; Yan Yao; Sy-Yen Kuo
National Natural Science Foundation of China [61001072]; Natural Science Foundation of Fujian Province of China [2010J01347]; Tsinghua-Qualcomm joint research fund