Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Xiangrong Xiao
Total Records ( 4 ) for Xiangrong Xiao
  Xiangrong Xiao , Xingming Sun , Xinbing Wang and Lei Rao
  In this study, we propose a non-cryptology and protocol-independent technique based on information hiding, called Data-Oriented Security Model (DOSM). Instead of one layer of protection, the proposed scheme offers two-fold protection against attack. An attacker first explores whether the data in question carries any useful information and then conducts extraction on it. Information is concealed by changing some properties of the data, which does not incur extra overheads to the sensor nodes. With the help of DOSM, each forwarding node can verify the embedded marks using the source node ID in each packet. This mechanism is used to filter data in a distributed manner. It can also avoid fake and tamper attacks by terminating bad packets as soon as they are detected. The data security is guaranteed by filtering the inconsistent packets between the hidden data and its source ID, which yields low energy consumption and high reliability. The simulation results show that the proposed DOSM protects the security of data communication and achieves data authentication invisibly at small overhead expense.
  Ang Gao , Wei Wei and Xiangrong Xiao
  Wireless Sensor Networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. Secure authentication between the two participating entities is of typical defense against data modified and fabricated by an adversary. In this study, considering environment and dynamic topology having a significant impact on the communication radius of sensor, we proposed a secure Multi-hop authentication scheme: the data message source is verified with keys derived from multiple one-way hash sub-chains related to communication radius of node, while offering greater resilience against node compromised by designing the hash chain length which guarantees that sub-chains are picked with the low probability of overlap between two or more sensors. Compared to existing solution, the proposed method greatly alleviates extra memory space taken and lower energy consumption extends the network lifetime benefiting from the distributed strategy.
  Sun Wei , Wei Wei , Jing Zhang , Wei Wang , Jinwei Zhao , Junhuai Li , Peiyi Shen , Xiaoyan Yin , Xiangrong Xiao and Jie Hu
  In recent years, with the development of data warehouse and Web technology, more and more attention has been paid to multiple applications of the data in warehouse. However, data quality issue is one of the biggest obstacles to the success using of data warehouse project for many enterprises. So a data audit model is proposed and the relevant methods are studied in the study based on the characteristics of the telecommunications industry. Further, a three data layer audit method, consisted of audit mode data file level, record level and index level, is constructed during Extraction Transformation Loading (ETL) process. It can effectively improve the data quality of data warehouse.
  NaQi , Wei Wei , Jing Zhang , Wei Wang , Jinwei Zhao , Junhuai Li , Peiyi Shen , Xiaoyan Yin , Xiangrong Xiao and Jie Hu
  With the continuous development of society and the prevalence of computer and network technology. How to ensure the security of information in the course of transmission have become the most important things for people at present. With this background, we studied how to realize encryption and decryption of the RSA (Initials of Ron Rivest, Adi Shamirh, LenAdleman) encryption technology. This study mainly introduces the application of RSA algorithm in encryption and decryption, mentions the technology of digital signature. Also introduces in the process of implementation of RSA algorithm in Visual Studios environment and operation results. Using this system for encryption and decryption of information, theoretically, good results were obtained in safety and reliability.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility