scispace - formally typeset
Search or ask a question
Author

Xuhong Li

Bio: Xuhong Li is an academic researcher. The author has contributed to research in topics: On-the-fly encryption & Encryption. The author has an hindex of 3, co-authored 11 publications receiving 27 citations.

Papers
More filters
Proceedings ArticleDOI
28 Apr 2017
TL;DR: A hybrid encryption system is used to encrypt and decrypt the tripleDES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management.
Abstract: With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is d...

11 citations

Proceedings ArticleDOI
25 May 2012
TL;DR: Based on the public discrete logarithm hard problem solely, this paper proposes a novel convertible authenticated encryption scheme without using hash functions, and extends it to a (t, n) threshold scheme.
Abstract: An authenticated encryption scheme allows a designated recipient to recover the message and then verify its authenticity while keeping the message secret from the public, and a convertible authenticated encryption scheme enables the recipient to convert the signature to an ordinary one so that any third party can verify its validity. The paper shows a weaknesses in Chien's [3] convertible authenticated encryption scheme, then based on the public discrete logarithm hard problem solely, we propose a novel convertible authenticated encryption scheme without using hash functions, and extend it to a (t, n) threshold scheme. The proposed schemes have the following characteristics: Each scheme provides semantic security of the message, that is, after getting a valid signature, any adversary cannot determine whether his guessed message is the actual message signed by the sender by checking if it satisfies the verification equalities. If the signer repudiates her signature, the recipient can prove, without the cooperation with the signer, the dishonesty of the signer to any third party by revealing the message and its converted signature; If the recipient does not reveal the converted signature, any third party cannot check the validity of the message even though he gets the message and its corresponding signature; There are no hash functions in the proposed convertible authenticated encryption schemes.

7 citations

Proceedings ArticleDOI
28 Apr 2017
TL;DR: The basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and the shortcomings of the existing RFID-based logistics monitoring system are introduced and the feasibility of this technology applied to logistics field is analyzed.
Abstract: This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

6 citations

Proceedings ArticleDOI
Xia Wang, Xiaofei Sun, Wenwen Pan, Tao Xu, Xuhong Li 
01 Oct 2017
TL;DR: A new routing protocol called Success Ratio-based Routing (SRR) protocol is proposed, which can dispatch each message in an efficient and accurate way, balancing the delivery ratio and communication overhead.
Abstract: Opportunistic networks can dispatch the messages among mobile devices through dynamic routes. Therefore time efficiency of routing protocol is an important performance metric for opportunistic networks. This paper propose a new routing protocol called Success Ratio-based Routing (SRR) protocol, which can dispatch each message in an efficient and accurate way, balancing the delivery ratio and communication overhead. SRR undertakes the experience statistics for the nodes' motion in opportunistic networks, and finds that part of mobile nodes have fixed social attribute, having regular daily routine. SRR introduces a new parameter Success Ratio (SR) to measure quality of paths, picking the optimal path to dispatch message. SRR also adopts a lightweight algorithm to construct the forwarding table, which utilizes the local parameters to calculate SR, saving the network resources. The extensive simulation experiments demonstrate that SRR protocol is able to cost less communication overhead and network resources to dispatch the message in an efficient and accuracy way.

3 citations

Proceedings ArticleDOI
30 May 2015
TL;DR: The overall design of wireless sensor networks and sensor nodes challenges are analyzed, and the design of the wireless sensor network system based on Internet of things is put forward.
Abstract: With the development of computer and related technology, makes the computing, communications, network and sensor, and other functions are integrated in wireless sensor network technologies. This article is precisely based on this research background, we have analyzed the overall design of wireless sensor networks and sensor nodes challenges, and puts forward the design of the wireless sensor network system based on Internet of things. At the same time, in the wireless sensor network (WSN) can also be carried out in the field of smart home application demonstration, through the information appliances connected to the sensor network, can provide people live with one of the most comfortable environment.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A novel user clustering approach based on Quantum-behaved Particle Swarm Optimization (QPSO) has been proposed for the collaborative filtering based recommender system and evaluation results prove the usefulness of the generated recommendations and depict the users’ satisfaction on the proposed recommendation approach.

86 citations

Journal Article
TL;DR: In this article, the design of wireless sensor network and Internet technology of farmland automatic irrigation control method is discussed to improve irrigation water use efficiency and reduce cost of irrigation water, this paper discussed the design and analysis of the routing protocol of sensor network nodes, it will constitute a variety of sensors intelligent sensor network to enhance the overall automation system and monitoring levels.
Abstract: To improve irrigation water use efficiency and reduce cost of irrigation water,this paper discussed the design of wireless sensor network and Internet technology of farmland automatic irrigation control methodEmphasis on An analysis of the routing protocol of sensor network nodes is emphasised to achieve the system hardware and software design,it will constitute a variety of sensors intelligent sensor network to enhance the overall automation system and monitoring levelsThe final analysis of the network in the Internet based on the agricultural plants of farmland water-saving irrigation system integrated approachUsers use mobile phones or wireless PDA can easily soil moisture content of online monitoring and control to realize the irrigation automationApplication results show that system through the embedded control technology complete intelligent irrigation,improve the agricultural irrigation water use efficiency and irrigation system automatization is generally low status,can well realize water saving

54 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigate the potential of different digital tools in mitigating barriers for increased utilization of intermodal transport and find that adoption by market leaders, demand from inter-modal transports buyers, vertical integration in inter-dimensional transport chains are potential mitigation factors for elimination of barriers to digitalization in interdimensional transport.
Abstract: Although it offers 1 both economic and environmental advantages particularly for long-distances, intermodal transport is still not utilized effectively, and it is challenged by many barriers to its utilization. On the other hand, the transport sector is influenced by recent trends, such as digitalization, Industry 4.0 and many technological innovations are introduced, aiming to transform the way of doing business. Therefore, understanding digitalization's potential to solve the transport sector's struggle for a higher degree of integration between different modes in intermodal transport is important. The purpose of this paper is to investigate the potential of different digital tools in mitigating barriers for increased utilization of intermodal transport. Semi-structured interviews and a policy Delphi study combined with a brainstorming session are conducted to classify various barriers for intermodal transport under certain categories and to understand if and how selected digital tools could help to mitigate these barriers. Findings indicate that the multi-actor nature of intermodal transport networks results in varying perceptions related with digital tools and technologies. This variance acts as a hindrance for digitalization within the conservative context of transportation industry and its cost-based competition structure. Adoption by market leaders, demand from intermodal transport buyers, vertical integration in intermodal transport chains are potential mitigation factors for elimination of barriers to digitalization in intermodal transportation.

36 citations

Journal ArticleDOI
TL;DR: This work focuses on addressing the online multi-tenant provisioning (On-MTP) problem for QKD networks, where multiple tenant requests (TRs) arrive dynamically and the RL-based On- MTP algorithm significantly outperforms the presented heuristics in terms of tenant-request blocking probability and secret-key resource utilization.
Abstract: Quantum key distribution (QKD) networks are potential to be widely deployed in the immediate future to provide long-term security for data communications. Given the high price and complexity, multi-tenancy has become a cost-effective pattern for QKD network operations. In this work, we concentrate on addressing the online multi-tenant provisioning (On-MTP) problem for QKD networks, where multiple tenant requests (TRs) arrive dynamically. On-MTP involves scheduling multiple TRs and assigning non-reusable secret keys derived from a QKD network to multiple TRs, where each TR can be regarded as a high-security-demand organization with the dedicated secret-key demand. The quantum key pools (QKPs) are constructed over QKD network infrastructure to improve management efficiency for secret keys. We model the secret-key resources for QKPs and the secret-key demands of TRs using distinct images. To realize efficient On-MTP, we perform a comparative study of heuristics and reinforcement learning (RL) based On-MTP solutions, where three heuristics (i.e., random, fit, and best-fit based On-MTP algorithms) are presented and a RL framework is introduced to realize automatic training of an On-MTP algorithm. The comparative results indicate that with sufficient training iterations the RL-based On-MTP algorithm significantly outperforms the presented heuristics in terms of tenant-request blocking probability and secret-key resource utilization.

34 citations

Journal ArticleDOI
TL;DR: This article comprehensively review the applications of RL in wireless networks from a layering perspective, and outlines a broad spectrum of challenges, open issues, and future research directions of RL-empowered wireless networks.
Abstract: Driven by the soaring traffic demand and the growing diversity of mobile services, wireless networks are evolving to be increasingly dense and heterogeneous. Accordingly, in such large-scale and complicated wireless networks, optimal controlling is reaching unprecedented levels of complexity while its traditional solutions of handcrafted offline algorithms become inefficient due to high complexity, low robustness, and high overhead. Therefore, reinforcement learning (RL), which enables network entities to learn from their actions and consequences in the interactive network environment, attracts significant attention. In this article, we comprehensively review the applications of RL in wireless networks from a layering perspective. First, we present an overview of the principle, fundamentals, and several advanced models of RL. Then, we review the up-to-date applications of RL in various functionality blocks of different network layers, ranging from the low-level physical layer to the high-level application layer. Finally, we outline a broad spectrum of challenges, open issues, and future research directions of RL-empowered wireless networks.

19 citations