Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Caidan Zhao is active.

Publication


Featured researches published by Caidan Zhao.


international conference on wireless communications, networking and mobile computing | 2009

Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio

Caidan Zhao; Wumei Wang; Lianfen Huang; Yan Yao

Cognitive Radio (CR) is regarded as one of the best options to solve the problem of low spectrum utilization. However, information security of CR limits its wide application. Most of the known security schemes are aiming at the location verification for incumbent transmitter, but it is not available for Ad hoc. In this paper, a new security scenario in physical layer is proposed. It takes advantage of the fingerprint verification of the transmitter against primary user emulation (PUE) attacks. The phase noise of the noisy carrier is extracted from the received modulated signal and directly applied to identify the transmitter.


communications and mobile computing | 2010

A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks

Caidan Zhao; Liang Xie; Xueyuan Jiang; Lianfen Huang; Yan Yao

Cognitive radio (CR) was proposed as the key technologies to achieve the secondary usage of the spectrum. The security problems of CR networks have not been intensively studied, such as the primary user emulation (PUE) attacks. In this paper, we study the non-interactive security issues for wireless networks and propose a physical layer authentication approach to prevent PUE attacks in CR networks. We extract transmitter location fingerprints from the wireless medium in the multipath propagation environment. Wavelet transform is used to extract the characteristics of these fingerprints. Simulation and experiment results show that our approach can identify the PUE attackers and the legitimate primary users effectively.


international conference on computer science and education | 2011

Transient fingerprint feature extraction for WLAN cards based on polynomial fitting

Caidan Zhao; Lianfen Huang; Liting Hu; Yan Yao

With the rapid development of cognitive radio network (CRN), the information security has become a primary concern. In this paper, transient fingerprinting is incorporated into CRN for detecting Primary User Emulation (PUE) attacks. A novel approach is proposed to extract transient fingerprint feature of transmitters. The energy envelope obtained from the instantaneous signal by spectrogram analysis, is fitted according to the least square estimation. The polynomial coefficients are selected as the feature vectors of instantaneous signal. A data acquisition system is designed to capture IEEE802.11b signals in the 2.4GHz ISM band. The results of data analysis indicate that it greatly improves the performance of detecting different brand of WLAN cards.


IEEE Wireless Communications | 2017

Secure Machine-Type Communications toward LTE Heterogeneous Networks

Caidan Zhao; Lianfen Huang; Yifeng Zhao; Xiaojiang Du

Machine-type communication is undergoing ubiquitous development by connecting with trillions of intelligent devices and providing a broad range of applications through all of our lives. MTC can access different networks, which is similar to a fusion of heterogeneous networks, including LTE, WiFi, ZigBee, and so on. However, security and privacy issues still bring about a great challenge for the development of MTC, particularly secure transmission under heterogeneous networks. This article first presents an overview of the MTC architecture and its evolution toward LTE, security threats, and solutions. Then, as 5G systems have been designed to support a diverse set of communications, we propose a scalable cross-layer authentication solution based on MTC devices’ hardware fingerprints toward an LTE heterogeneous network.


Multimedia Tools and Applications | 2015

The RR-PEVQ algorithm research based on active area detection for big data applications

Wei-Jian Xu; Caidan Zhao; Hua-Pei Chiang; Lianfen Huang; Yueh-Min Huang

The reduced-reference video quality evaluation method uses only partial reference video information to evaluate the quality of deteriorated videos. This method can evaluate the quality of a video in real-time because less transmission bandwidth is required. Because the video active area attracts significant human eye attention, any deterioration in the active area will directly affect video evaluation results. Given the advantage of reduced reference model in VQM (Video Qualify Metric), this paper proposes a reduced reference evaluation model named RR-PEVQ (Reduced Reference Perceptual Evaluation of Video Quality) for weighting the active video area. According to the experimental results, the RR-PEVQ evaluation score is similar to that of the full reference PEVQ and the proposed method’s practicability is greatly improved for big data purposes.


The Scientific World Journal | 2014

Compressed Sensing Based Fingerprint Identification for Wireless Transmitters

Caidan Zhao; Xiongpeng Wu; Lianfen Huang; Yan Yao; Yao-Chung Chang

Most of the existing fingerprint identification techniques are unable to distinguish different wireless transmitters, whose emitted signals are highly attenuated, long-distance propagating, and of strong similarity to their transient waveforms. Therefore, this paper proposes a new method to identify different wireless transmitters based on compressed sensing. A data acquisition system is designed to capture the wireless transmitter signals. Complex analytical wavelet transform is used to obtain the envelope of the transient signal, and the corresponding features are extracted by using the compressed sensing theory. Feature selection utilizing minimum redundancy maximum relevance (mRMR) is employed to obtain the optimal feature subsets for identification. The results show that the proposed method is more efficient for the identification of wireless transmitters with similar transient waveforms.


Intelligent Automation and Soft Computing | 2014

Performance Analysis of the Multiple Antenna Asynchronous Cognitive MAC Protocol in Cognitive Radio Network for IT Convergence

Caidan Zhao; Lianfen Huang; Zilong Gao; Sha-Li Zhou; Dan Guo; Han-Chieh Chao

Multiple antenna technology for wireless communications is becoming mature and wide ranging in the wireless broadband network. Many spectrum usage measurement reports have shown that inaccurate spectrum sensing will waste spectrum resources. A Multiple Antenna Asynchronous Cognitive MAC (MAAC-MAC) protocol is proposed through introducing a multiple antenna architecture and power control mechanism into the hardware-constrained cognitive MAC (MHC-MAC) protocol with Asynchronous-Assembly Line Mode in cognitive radio network. In the spectrum sensing stage, the protocol makes use of multiple antennas to perform spectrum sensing and positioning, aimed at improving spectrum sensing and detection performance. During the negotiation phase, the CU (Cognitive User) access power control mechanism fully utilizes the licensed band without interfering PU (Primary User) and also increases the transmission rate and system throughput. It may be used for improved positioning and location-based services both indoors and outd...


international conference on signal processing | 2013

Detection of Wi-Fi transmitter transients using statistical method

Lianfen Huang; Minghui Gao; Caidan Zhao; Xiongpeng Wu

Algorithms used to detect Wi-Fi transmitter transients are discussed in this paper, and the start of a Wi-Fi transmitter transient, in our opinion, has a new definition. Current algorithms, namely Variance Fractal Dimension Threshold Detection, Bayesian Step Change Detection and Phase Detection are analyzed at the beginning of this article. According to the disadvantages such as complexity, accuracy and a threshold needed in the final determination of these traditional methods, an improved algorithm based on Mean Change Point Detection is put forward. Threshold for determination and nonparametric estimation for hypothesis test are not needed in our improved approach, it detects the start of transient only by calculating the maximum of the difference of statistic. Moreover, the experimental results show that this improved method outperforms the other three methods, particularly in the case of low SNR.


international conference on signal processing | 2013

Identification of radio transmitters fingerprint based on curve fitting

Lianfen Huang; Xiongpeng Wu; Caidan Zhao; Minghui Gao

Recently, radio individual identification draws the attention of related research institutions because of its great significance in various fields. In this paper, transient envelope feature is applied to the identification of radio transmitters. A novel approach is proposed to extract the transient envelope feature of radio transmitters based on fitting. According to the characteristics of the radio signal, the transient envelope obtained from the signal by complex analytical wavelet transform, is fitted by Gaussian function and sinusoidal function. The fitting coefficients regarded as feature vector are used for individual identification. The results of data analysis indicate that both Gaussian fitting and sinusoidal fitting have a good recognition performance of identifying different radio transmitters.


Wireless Communications and Mobile Computing | 2013

Wireless local area network cards identification based on transient fingerprinting

Caidan Zhao; Ting-Yun Chi; Lianfen Huang; Yan Yao; Sy-Yen Kuo

National Natural Science Foundation of China [61001072]; Natural Science Foundation of Fujian Province of China [2010J01347]; Tsinghua-Qualcomm joint research fund

Collaboration


Dive into the Caidan Zhao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mingjun Shi

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge