Home /Institution of Information Network and Security
Key Laboratory of Communication & Information Systems & Institute of Network Consensus Security (Beijing Jiaotong University)
1.Introduction
Beijing Key Lab of Communication and System (Beijing Jiaotong University) is directed by Beijing Municipal Education Commission. In cooperation with ZTE, we have built latest and complete communication network experiment platform which covers the main fields of communication system, including switching network, 3G/4G mobile communication network, optical access network, optical fiber transmission and computer network systems. We have studied in the communication, network and cybersecurity area for decades and accomplished over 100 research programs, including national 973 and 863 programs, national key R&D plans and National Natural Science Foundation of China, projects of Ministry of Education, International cooperation projects, etc. We have conducted cooperative research with some top universities from America, Europe, Asia, Oceania such as Carnegie Mellon University, University of Sydney, University of Bedfordshire and Nanyang Technological University.
Our team members all are faculties from School of Electronic and Information Engineering in Beijing Jiaotong University,including 5 full professors, 13 associate professors and 2 lecturers. We have cultivated more than 20 Ph.Ds and over 250 masters, 16 doctoral students and 78 postgraduate students are studying in our lab currently.
Our research areas include Internet communication and information processing, data mining, big data storage, management and security, natural language processing and artificial intelligence, blockchain, Internet of Things and wireless sensor network, communication network theory, wireless communication, cloud computing, mobile Internet, network content security and so on. In recent years, we have published over 300 academic papers in related domestic and international journals and conferences.
2.Research Area
Big Data & Network Content Security
The research in this field is supported by Institute of Network Consensus Security (Beijing Jiaotong University), Zhongguancun Open Laboratory, National Engineering Laboratory of Mobile Internet System and Application Security.
Our reseach adopt interdisciplinary methods such as machine learning, data mining, complex network, game theory etc. Research topics include the platform and key technologies of large-scale data analysis of network public opinion, mobile Internet content perception and behavior mining technology, network information origin detection and online emergency warning, large-scale personalized recommend systems of social networks, hierarchical overlapping community discovery technology, influential subject identification and tracing method, multi-source heterogeneous data fusion technology, etc.
Based on complex system theory, evolutionary game theory, organic computing and economic operation theory, we study the formation and evolution model of user preferences in social networks, user trust and link prediction, phase change conditions of network macro-characteristics, evaluation and analysis methods of network public opinion, etc.
With the help of Hadoop, Spark, Mahout and other frameworks and tools, we have constructed a large data acquisition platform, information search engine, semantic analysis platform, evolutionary prediction platform, big data storage and analysis platform, and established a complete set of network content security monitoring prototype system which based on big data storage, analysis and mining.
Internet of Things and Wireless Sensor Networks
The main research topics in the field of Internet of Things (IoT) and wireless sensor networks include fog computing based IoT applications, intelligent information fusion technology, sensor development technology, and IoT security protection technology. Among them, the fog computing based IoT applications aims to migrate computing and storage services to local fog servers, providing low-energy and low-latency IoT application services. The application scenarios include multimedia monitoring, smart factories, vehicle networks, etc.
The main research issues include IoT task scheduling, resource management, mobility management, and traffic balancing in a fog computing environment. Information fusion technology aims to intelligently process heterogeneous, multi-source, and dynamic IoT-aware data and fuse in data, feature, or decision-level, to obtain high-quality target information. More specificly, we study distributed target detection and recognition, wearable sensing data fusion positioning and health assistance, sensor data correction and calibration techniques. In wireless sensor technology, our focus is on the development of wearable nodes and wireless sensor nodes, including renewable energy supplies, heterogeneous sensor integration, and portable individual combat command systems. In the aspect of IoT security protection, we mainly study the IoT data secure transmission technology, and data security and privacy protection technologies of sensor nodes and wearable nodes, such as homomorphic encryption and k-anonymity.
Cloud Computing and its Security
As the backbone of the new generation of information technology, cloud computing has become the hot spot of information technology development and application innovation. In cloud computing environment, users are facing many challenges such as data security and privacy protection. Security has become one of the key issues which hindering the development of cloud computing. The research in this field provides theoretical basis and new application means for balancing multi-party security requirements, establishing secure cloud data publishing and sharing services, enhancing privacy protection, and establishing new mechanism for cloud data integrity verification. Relevant achievements in this field enrich the theory and method of cloud computing data security based on cryptographic access control. Research topics include cloud data security and privacy protection, secure outsourced computation, authentication and identity management, etc.
Blockchain
As a new paradigm of distributed network ledger system, blockchain has the characteristics of trustworthiness, transaction traceability and non-tampering, which can meet the realistic security requirements of various types of large-scale network transactions. At the same time, it also provides a foundation and development impetus for technological innovation. As a disruptive innovation technology, blockchain has potential to penetrate into various fields such as finance, assets, copyright, law, public welfare, and become the new driving force for business and economy growth. However, some security problems in blockchain are gradually exposed, and security has become one of the key issues which hindering the development of blockchain.
Our team studies the problem of reconstructing trust and enhancing transparency, reliability and security in untrusted networks. The research includes blockchain cryptographic algorithms, consensus mechanisms, smart contract, digital identity, privacy protection technology, blockchain platform development, etc.
3.People
Director, YunLiu, Professor
Email: liuyun@bjtu.edu.cn
Tel: :+86-010-51684227
Fax: :+86-010-51684227
Research Areas:
Network consensus security
Internet of Things
Information systems
memeber, Zhengjiang Zhang, Professor
Email: zhjzhang1@bjtu.edu.cn
Tel: +86-010-51683729
Fax: +86-010-51683729
Research Areas:
Wireless sensor networks
Computer networks
Analysis of user behaviors
memeber, Bo Shen, Professor
Email: bshen@bjtu.edu.cn
Tel: +86-010-51684227
Fax: +86-010-51684227
Research Areas:
Opinion Formation in the Internet
Complexity of Networks
Wireless Sensor Network
Social Network Analysis
Network Communication
memeber, Fei Xiong, Associate Professor
Email: xiongf@bjtu.edu.cn
Tel: +86-010-51688676
Fax: +86-010-51688676
Research Areas:
Big data mining
Internet content security
Social network analysis
Recommend system
memeber, BI Hongjun, Associate Professor
Email: hjbi@bjtu.edu.cn
Tel: +86-010-51688676
Fax: +86-010-51688676
Research Areas:
Network Security
Cryptography
Telcommunication
memeber, Fan Jia, Associate Professor
Email: fjia@bjtu.edu.cn
Tel: +86-010-51688676
Fax: +86-010-51688676
Research Areas:
Network and Information Security
Recommend System
Dynamics of Opinions on Internet
memeber, Mu Haibing, Associate Professor
Email: hbmu@bjtu.edu.cn
Tel: +86-010-51688676
Fax: +86-010-51688676
Research Areas:
Communication and Information system
Computer network
Network and Information Security
memeber, Yong Li, Associate Professor
Email: liyong@bjtu.edu.cn
Tel: +86-010-51688676
Fax: +86-010-51688676
Research Areas:
Blockchain Security
Cloud Computing Security
Applied Cryptography
memeber, Jian Li, Associate Professor
Email: lijian@bjtu.edu.cn
Tel: +86-010-51688676
Fax: +86-010-51684227
Research Areas:
Secure network coding in hostile networks
Secure cloud storage
Authentication and source privacy in wireless sensor networks
Biomedical signal analyzing in neural systems
GPS baseband signal processing and hardware implementation
Visit us
Address
The teaching building 9#, institute of electronic and Information Engineering, Beijing JiaoTong University, ShangYuanCun 3#, Haidian, Beijing.
Contact ZHENJIANG ZHANG
Fax:+86(010)51684227
Code:100044; Tel:(010)51684227
Email: zhangzhenjiang@bjtu.edu.cn