Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Future prospect of intelligent Internet of Vehicles system
    • TIAN Daxin
    • Information and Communications Technology and Policy. 2020, 46(8): 1-4.
    • Abstract ( 368 )   
    • In view of the development trend of Internet of Vehicles (IoV) under transportation and new infrastructure constructions, this paper presents development directions of intelligent IoV system from the perspectives of intelligent terminal, communication, edge service, cloud management and control. Then, it discusses the issues and corresponding solutions in massive data processing, communication and computing cooperation, edge service security,large-scale testing and verification in the development of intelligent IoV system.
    • Related Articles | Related Articles | Metrics
    • High-speed optical transmission technology and standardization progress
    • ZHAO Wenyu
    • Information and Communications Technology and Policy. 2020, 46(8): 5-11.
    • Abstract ( 345 )   
    • In recent years, the diversified high-bandwidth services have accelerated the innovation and development of high-speed optical fiber transmission technology. This paper focuses on the analysis of high-speed optical transmission technology and industrial application status around single-channel ultra-high-speed transmission, transmission band expansion, space division multiplexing, etc., and introduces the latest progress of international and national standardization in this field. Finally, combined with typical application requirements, this paper prospects the main trend of the future development of high-speed optical transmission technology.
    • Related Articles | Related Articles | Metrics
    • IPv6 trend analysis from the perspective of IETF
    • XIE Chongfeng
    • Information and Communications Technology and Policy. 2020, 46(8): 12-17.
    • Abstract ( 395 )   
    • IETF is the dominant global standardization organization of internet technologies. While IPv6 is being deployed and applied globally, IETF continues to improve the IPv6 series of protocols and has formulated various standards for new technologies based on IPv6 basic technologies. On the basis of investigating the latest developments of IETF’s IPv6 work, this paper analyzes the future development trend of IPv6 and its impact on network development.
    • Related Articles | Related Articles | Metrics
    • C-V2X technology evolution and industry practice
    • HU Jinling ZHAO Rui FANG Jiayi et al.
    • Information and Communications Technology and Policy. 2020, 46(8): 22-31.
    • Abstract ( 497 )   
    • This paper discusses the development of C-V2X technology and industry, analyzes the application development and communication requirements of the Internet of Vehicles, and introduces the key technologies of the NR-V2X, including the physical layer architecture design of the through link, resource allocation, HARQ mechanism,synchronization, etc. Then, it summarizes the development of C-V2X in China and the global industry and the timetable for C-V2X commercial deployment.
    • Related Articles | Related Articles | Metrics
    • Analysis of the data security risk of Internet of Vehicles and the solutions
    • TAN Qingling, XIE Lijing
    • Information and Communications Technology and Policy. 2020, 46(8): 37-40.
    • Abstract ( 558 )   
    • The Internet of Vehicles (IoV) is a new industrial form deeply integrated by automobile, electronics,information communication, road transportation and other industries. It is a global innovation hotspot and the commanding height of future development. At the same time, the development of IoV also faces huge security challenges, among which data security is the focus of the current research and management. This paper analyzes the data chain in the application of IoV and the possible data security risks, and puts forward relevant suggestions from the perspectives of security technology industry, data security governance and data cross-border flow.
    • Related Articles | Related Articles | Metrics
    • Research on the cryptographic application system of vehicle to everything
    • XU Xiu, TANG Minghuan, MA Cong, YU Rundong
    • Information and Communications Technology and Policy. 2020, 46(8): 46-51.
    • Abstract ( 572 )   
    • In the process of the intelligentization and networking of the Internet of Vehicles (IoV), the security issue is increasingly important. As the core technology and basic support to ensure the security of IoV, cryptography plays an irreplaceable role in data encryption and identity authentication. In China, the cryptographic application is still in the infancy. In this paper, we introduce the commercial cryptographic algrithms, relevant standards, and how to ensure the safety with the cryptographic application and the PKI system. We also propose some advice about its cryptographic application system.
    • Related Articles | Related Articles | Metrics
    • Research on scene and technology of intelligent and connected driving in open mine
    • KANG Chen, HAO Dayu, WANG Xiaoyan, LI Lu
    • Information and Communications Technology and Policy. 2020, 46(8): 52-58.
    • Abstract ( 420 )   
    • This article analyzes the operation scenarios and typical applications of intelligent connected driving in openpit mine scenes, and their corresponding relationship. Then, it analyzes the overall technical architecture of open-pitcmine intelligent connected autonomous driving, studying the technical attributes of the vehicle terminal, network and cloud platform under this architecture. Finally, this article prospects the future trends of technology and industry development.
    • Related Articles | Related Articles | Metrics
    • The boundary of commercial use of government data
    • ZENG Yunhao, LIU Gaofeng
    • Information and Communications Technology and Policy. 2020, 46(8): 59-62.
    • Abstract ( 429 )   
    • The case of unfair competition between Ant Financial and Qichacha, is the first judicial case caused by improper commercial use of government data in China. The judgment made by the court to maintain the credibility of government data and affirm the rights of the original data subject, reflects the general cognition of the society to data governance. The commercial subject has the right to use open data, but the exercise of the right has boundaries. Improper use of government data will damage the rights of the original data subject, the credibility of the government,the interests of consumers and the image of the data industry. When market entities make use of government data, they need to perform certain duty of care, including obtaining data in a legal way, ensuring the credibility and security of data, and legally processing data.

    • Related Articles | Related Articles | Metrics
    • Epidemic response and data protection in Europe and America
    • YANG Chunbaixue, CHEN Tian
    • Information and Communications Technology and Policy. 2020, 46(8): 63-67.
    • Abstract ( 363 )   
    • The sudden outbreak of COVID-19 brought unprecedented challenges to the global medical system and social operation mode. Legislation and regulatory agencies in various countries remind the public to pay attention to data security and privacy protection while preventing the epidemics. This article sorts out the institutional documents and regulatory policies in four key areas issued by EU and US during the pandemic, and analyzes their policy implications and enlightenments.
    • Related Articles | Related Articles | Metrics
    • Research on the evaluation of user data protection of IoV
    • WANG Yanyan, GUI Li, CAI Yafen
    • Information and Communications Technology and Policy. 2020, 46(8): 68-71.
    • Abstract ( 336 )   
    • The development of big data in the Internet of Vehicles (IoV) produces opportunities for smart transportation and unified government management. However, frequent data exchanges among vehicles, users, and platforms generate a large amount of user data. Whether the protection measures for these data meet user privacy protection requirements is a key issue for IoV industry. This paper analyzes the threats and protection requirements from the perspective of the IoV user data life cycle, and finally discusses the principles and evaluation methods on user data classification.
    • Related Articles | Related Articles | Metrics
    • Current situation and trend of body area network based on wearable computing
    • KOU Jiahua, TANG Lei, QIAO Zhi, ZHANG Song
    • Information and Communications Technology and Policy. 2020, 46(8): 75-79.
    • Abstract ( 506 )   
    • With the vigorous development of the digital health industry represented by the healthcare Internet of Things and smart wearable devices, the body area network technology based on wearable computing has also attracted widespread attention. This paper takes the wearable computing-based body area network as the research object, combing through the basic architecture of the body area network system, the sensor node architecture and the network layer communication standard protocol. Then, it studies the basic characteristics, development trend and supervision strategy of the technology. It is clarified that cloud computing, big data, block chain technology and their integration will become the main trend in the future, and regulatory standardization and technical standardization are of great significance to the development of the industry.
    • Related Articles | Related Articles | Metrics
    • IoT things access and control scheme based on description rules
    • LIU Peiyun, MA Chao, WEN Xiuxiu
    • Information and Communications Technology and Policy. 2020, 46(8): 80-84.
    • Abstract ( 292 )   
    • Based on the description rules of Internet of Things object access and control method, this paper refines the common laws in the access of a large number of IoT objects, and solves the problem of the integration of IoT applications across vendors, types, and cross-vendors, considering object interaction interface protocol types. This method can effectively reduce the difficulty and complexity of IoT object accessing platform with strong scalability and good maintainability.
    • Related Articles | Related Articles | Metrics
    • Research on multidimensional data fusion of Industrial Internet identification based on UICC
    • MA Baoluo, CHI Cheng, TIAN Juan, JIA Xueqin
    • Information and Communications Technology and Policy. 2020, 46(8): 85-88.
    • Abstract ( 320 )   
    • Industrial data fusion is an important way to break the information island and realize data exchange and information sharing. Industrial Internet identification can be used as an important medium for data association and fusion among different enterprises. The Industrial Internet identification is written into the UICC card to enable the capability of wide area networking. This paper proposes a data fusion model of Industrial Internet identification based on UICC to promote the transformation of traditional industrial enterprises to the intelligent manufacturing industry, to realize data fusion and information sharing among enterprises.
    • Related Articles | Related Articles | Metrics
    • Research on quality evaluation system of mobile network based on user experience
    • ZHANG Ruyuan, YAN Xupeng, HU Boran
    • Information and Communications Technology and Policy. 2020, 46(8): 89-92.
    • Abstract ( 415 )   
    • As the key infrastructure of information society, it is critical to ensure the stability and efficiency of mobile network. In traditional quality evaluation systems, the macro performance indexes such as coverage and throughput are always been evaluated, which could not reflect the real user experience in many cases. It is significant to study the new quality evaluation system based on user experience from the user side. This paper organizes the typical applications and their key indexes of quality evaluation system, and establishes the comprehensive scoring model.
    • Related Articles | Related Articles | Metrics
    • Application of LTE broadband communication in wireless private network
    • WANG Yong, LUO Yuqi , YANG Liwei
    • Information and Communications Technology and Policy. 2020, 46(8): 93-96.
    • Abstract ( 308 )   
    • This paper introduces the concept and characteristics of LTE broadband technology, expounds the application of LTE broadband communication in emergency communication, intelligent site, forest fire prevention and other special networks, and points out that LTE broadband communication technology will promote the development of special networks. 4G LTE is proposed to be used in key areas to realize video and high-speed data services.
    • Related Articles | Related Articles | Metrics