Qingxu Xiong

Learn More
Vehicle-to-grid (V2G), involving both charging and discharging of battery vehicles (BVs), enhances the smart grid substantially to alleviate peaks in power consumption. In a V2G scenario, the communications between BVs and power grid may confront severe cyber security vulnerabilities. Traditionally, authentication mechanisms are solely designed for the BVs(More)
Along with radio frequency identification (RFID) becoming ubiquitous, security issues have attracted extensive attentions. Most studies focus on the single-reader and single-tag case to provide security protection, which leads to certain limitations for diverse applications. This paper proposes a grouping-proofs-based authentication protocol (GUPA) to(More)
Cloud computing is an emerging data interactive paradigm to realize users' data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in a collaborative(More)
Abstract—A novel miniaturized dual-band bandstop filter (DBBSF) is proposed by using the T-shaped defected microstrip structures (DMSs) and the U-shaped defected ground structures (DGSs) in this paper. The layout of the dual-band bandstop resonator (DBBSR) is presented at first. The dual stopbands of the DBBSR can be separately controlled since the mutual(More)
In directed diffusion a sensor node finds the next hop node from its neighbor nodes randomly in proportion to the gradients being created during interest diffusion. However, some alternative paths may contain redundant nodes, leading to energy waste. This paper proposes a simple approach to reinforce the path without redundant node. A node always selects(More)
A novel application semantics based routing algorithm is proposed for wireless sensor networks to prolong network lifetime. The Sink node broadcasts task semantics message periodically in flooding fashion, the inter-network nodes process data at the different application task levels. According to semantic information of application and the node and its(More)
A novel application-specified MAC cross-layer design approach is proposed for wireless sensor networks. By using SWE architecture and Sensor ML, the sensor ontology is constructed, and the special inference ruler for MAC is defined by adopting computation geometry algorithms. By integrating application semantics with 802.11 and SMAC protocol, we propose the(More)
  • 1