Home £¯Institution of Information Network and Security

Key Laboratory of Communication & Information Systems & Institute of Network Consensus Security (Beijing Jiaotong University)

1.Introduction

Beijing Key Lab of Communication and System (Beijing Jiaotong University) is directed by Beijing Municipal Education Commission. In cooperation with ZTE, we have built latest and complete communication network experiment platform which covers the main fields of communication system, including switching network, 3G/4G mobile communication network, optical access network, optical fiber transmission and computer network systems. We have studied in the communication, network and cybersecurity area for decades and accomplished over 100 research programs, including national 973 and 863 programs, national key R&D plans and National Natural Science Foundation of China, projects of Ministry of Education, International cooperation projects, etc. We have conducted cooperative research with some top universities from America, Europe, Asia, Oceania such as Carnegie Mellon University, University of Sydney, University of Bedfordshire and Nanyang Technological University.

Our team members all are faculties from School of Electronic and Information Engineering in Beijing Jiaotong University£¬including 5 full professors, 13 associate professors and 2 lecturers. We have cultivated more than 20 Ph.Ds and over 250 masters, 16 doctoral students and 78 postgraduate students are studying in our lab currently.

  Our research areas include Internet communication and information processing, data mining, big data storage, management and security, natural language processing and artificial intelligence, blockchain, Internet of Things and wireless sensor network, communication network theory, wireless communication, cloud computing, mobile Internet, network content security and so on. In recent years, we have published over 300 academic papers in related domestic and international journals and conferences.



2.Research Area

     Big Data & Network Content Security

The research in this field is supported by Institute of Network Consensus Security (Beijing Jiaotong University), Zhongguancun Open Laboratory, National Engineering Laboratory of Mobile Internet System and Application Security.

Our reseach adopt interdisciplinary methods such as machine learning, data mining, complex network, game theory etc. Research topics include the platform and key technologies of large-scale data analysis of network public opinion, mobile Internet content perception and behavior mining technology, network information origin detection and online emergency warning, large-scale personalized recommend systems of social networks, hierarchical overlapping community discovery technology, influential subject identification and tracing method, multi-source heterogeneous data fusion technology, etc.

Based on complex system theory, evolutionary game theory, organic computing and economic operation theory, we study the formation and evolution model of user preferences in social networks, user trust and link prediction, phase change conditions of network macro-characteristics, evaluation and analysis methods of network public opinion, etc.

With the help of Hadoop, Spark, Mahout and other frameworks and tools, we have constructed a large data acquisition platform, information search engine, semantic analysis platform, evolutionary prediction platform, big data storage and analysis platform, and established a complete set of network content security monitoring prototype system which based on big data storage, analysis and mining.  

Internet of Things and Wireless Sensor Networks

The main research topics in the field of Internet of Things (IoT) and wireless sensor networks include fog computing based IoT applications, intelligent information fusion technology, sensor development technology, and IoT security protection technology. Among them, the fog computing based IoT applications aims to migrate computing and storage services to local fog servers, providing low-energy and low-latency IoT application services. The application scenarios include multimedia monitoring, smart factories, vehicle networks, etc.

The main research issues include IoT task scheduling, resource management, mobility management, and traffic balancing in a fog computing environment. Information fusion technology aims to intelligently process heterogeneous, multi-source, and dynamic IoT-aware data and fuse in data, feature, or decision-level, to obtain high-quality target information. More specificly, we study distributed target detection and recognition, wearable sensing data fusion positioning and health assistance, sensor data correction and calibration techniques. In wireless sensor technology, our focus is on the development of wearable nodes and wireless sensor nodes, including renewable energy supplies, heterogeneous sensor integration, and portable individual combat command systems. In the aspect of IoT security protection, we mainly study the IoT data secure transmission technology, and data security and privacy protection technologies of sensor nodes and wearable nodes, such as homomorphic encryption and k-anonymity.

  Cloud Computing and its Security

As the backbone of the new generation of information technology, cloud computing has become the hot spot of information technology development and application innovation. In cloud computing environment, users are facing many challenges such as data security and privacy protection. Security has become one of the key issues which hindering the development of cloud computing. The research in this field provides theoretical basis and new application means for balancing multi-party security requirements, establishing secure cloud data publishing and sharing services, enhancing privacy protection, and establishing new mechanism for cloud data integrity verification. Relevant achievements in this field enrich the theory and method of cloud computing data security based on cryptographic access control. Research topics include cloud data security and privacy protection, secure outsourced computation, authentication and identity management, etc.

Blockchain

As a new paradigm of distributed network ledger system, blockchain has the characteristics of trustworthiness, transaction traceability and non-tampering, which can meet the realistic security requirements of various types of large-scale network transactions. At the same time, it also provides a foundation and development impetus for technological innovation. As a disruptive innovation technology, blockchain has potential to penetrate into various fields such as finance, assets, copyright, law, public welfare, and become the new driving force for business and economy growth. However, some security problems in blockchain are gradually exposed, and security has become one of the key issues which hindering the development of blockchain.

Our team studies the problem of reconstructing trust and enhancing transparency, reliability and security in untrusted networks. The research includes blockchain cryptographic algorithms, consensus mechanisms, smart contract, digital identity, privacy protection technology, blockchain platform development, etc.

3.People



Director, YunLiu, Professor

Email: liuyun@bjtu.edu.cn

Tel: :+86-010-51684227

Fax: :+86-010-51684227

Research Areas:

  • Network consensus security

  • Internet of Things

  • Information systems

memeber, Zhengjiang Zhang, Professor

Email: zhjzhang1@bjtu.edu.cn

Tel: +86-010-51683729

Fax: +86-010-51683729

Research Areas:

  • Wireless sensor networks

  • Computer networks

  • Analysis of user behaviors


memeber, Bo Shen, Professor

Email: bshen@bjtu.edu.cn

Tel: +86-010-51684227

Fax: +86-010-51684227

Research Areas:

  • Opinion Formation in the Internet

  • Complexity of Networks

  • Wireless Sensor Network

  • Social Network Analysis

  • Network Communication


memeber, Fei Xiong, Associate Professor

Email: xiongf@bjtu.edu.cn

Tel: +86-010-51688676

Fax: +86-010-51688676

Research Areas:

  • Big data mining

  • Internet content security

  • Social network analysis

  • Recommend system


memeber, BI Hongjun, Associate Professor

Email: hjbi@bjtu.edu.cn

Tel: +86-010-51688676

Fax: +86-010-51688676

Research Areas:

  • Network Security

  • Cryptography

  • Telcommunication


memeber, Fan Jia, Associate Professor

Email: fjia@bjtu.edu.cn

Tel: +86-010-51688676

Fax: +86-010-51688676

Research Areas:

  • Network and Information Security

  • Recommend System

  • Dynamics of Opinions on Internet




memeber, Mu Haibing, Associate Professor

Email: hbmu@bjtu.edu.cn

Tel: +86-010-51688676

Fax: +86-010-51688676

Research Areas:

  • Communication and Information system

  • Computer network

  • Network and Information Security


memeber, Yong Li, Associate Professor

Email: liyong@bjtu.edu.cn

Tel: +86-010-51688676

Fax: +86-010-51688676

Research Areas:

  • Blockchain Security

  • Cloud Computing Security

  • Applied Cryptography


memeber, Jian Li, Associate Professor

Email: lijian@bjtu.edu.cn

Tel: +86-010-51688676

Fax: +86-010-51684227

Research Areas:

  • Secure network coding in hostile networks

  • Secure cloud storage

  • Authentication and source privacy in wireless sensor networks

  • Biomedical signal analyzing in neural systems

  • GPS baseband signal processing and hardware implementation



  1. Visit us


Address

The teaching building 9#, institute of electronic and Information Engineering, Beijing JiaoTong University, ShangYuanCun 3#, Haidian, Beijing.

Contact ZHENJIANG ZHANG

Fax:+86(010)51684227

Code:100044; Tel:(010)51684227

Email: zhangzhenjiang@bjtu.edu.cn