Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xianghui Cao is active.

Publication


Featured researches published by Xianghui Cao.


IEEE Transactions on Industrial Electronics | 2010

Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks

Jiming Chen; Xianghui Cao; Peng Cheng; Yang Xiao; Youxian Sun

Wireless sensor and actuator networks (WSANs) bring many benefits to industrial automation systems. When a control system is integrated by a WSAN, and particularly if the network scale is large, distributed communication and control methods are quite necessary. However, unreliable wireless and multihop communications among sensors and actuators cause challenges in designing such systems. This paper proposes and evaluates a new distributed estimation and collaborative control scheme for industrial control systems with WSANs. Extensive results show that the proposed method effectively achieves control objectives and maintains robust against inaccurate system parameters. We also discuss how to dynamically extend the scale of a WSAN with only local adjustments of sensors and actuators.


Isa Transactions | 2008

Development of an integrated wireless sensor network micro-environmental monitoring system

Xianghui Cao; Jiming Chen; Yan Zhang; Youxian Sun

Wireless Sensor Network (WSN) is increasingly popular in the field of micro-environmental monitoring due to its promising capability. However, most systems using WSN for environmental monitoring reported in the literature are developed for specific applications without functions for exploiting users data processing methods. In this paper, a new system is designed in detail to perform micro-environmental monitoring taking the advantages of the WSN. The application-oriented hardware working style is designed, and the system platform for data acquisition, validation, processing and visualization is systematically presented. Several strategies are proposed to guarantee the system capability in terms of extracting useful information, visualizing events to their authentic time are also described. Moreover, a web-based surveillance subsystem is presented for remote control and monitoring. In addition, the system is extensible for engineers to carry their own data analysis algorithms. Experimental results are to show the path reliability and real-time characteristics, and to display the feasibility and applicability of the developed system into practical deployment.


IEEE Transactions on Industrial Electronics | 2010

Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed

Xianghui Cao; Jiming Chen; Yang Xiao; Youxian Sun

This paper considers joint problems of control and communication in wireless sensor and actuator networks (WSANs) for building-environment control systems. In traditional control systems, centralized control (CC) and distributed control (DC) are two major approaches. However, little work has been done in comparing the two approaches in joint problems of control and communication, particularly in WSANs serving as components of control loops. In this paper, we develop a CC scheme in which control decisions are made based on global information and a DC scheme which enables distributed actuators to make control decisions locally. We also develop methods that enable wireless communications among system devices compatible with the control strategies, and propose a method for reducing packet-loss rate. We compare the two schemes using simulations in many aspects. Simulation results show that the DC can achieve a comparable control performance of the CC, while the DC is more robust against packet loss and has lower computational complexity than the CC. Furthermore, the DC has shorter actuation latency than the CC under certain conditions.


IEEE Transactions on Industrial Informatics | 2013

An Online Optimization Approach for Control and Communication Codesign in Networked Cyber-Physical Systems

Xianghui Cao; Peng Cheng; Jiming Chen; Youxian Sun

Networked cyber-physical systems (NCPS), where control and communication are closely integrated, have been envisioned to have a large number of high-impact applications. In this paper, a joint optimization framework is presented, which combines the objective of control as well as other relevant system objectives and constraints such as communication errors, delays and the limited capabilities (e.g., energy capacities) of devices. The problem is solved by an online optimization approach, which consists of a communication protocol and a simulated annealing based control algorithm. Meanwhile, by taking into account the communication cost, we optimize the control intervals by integrating two kinds of acceptances, i.e., cyber and physical acceptances, into the control algorithm. Numerical results show the effectiveness of the proposed approach.


IEEE Transactions on Parallel and Distributed Systems | 2014

Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach

Jianping He; Jiming Chen; Peng Cheng; Xianghui Cao

Time synchronization is a fundamental requirement for the wide spectrum of applications with wireless sensor networks (WSNs). However, most existing time synchronization protocols are likely to deteriorate or even to be destroyed when the WSNs are attacked by malicious intruders. This paper is concerned with secure time synchronization for WSNs under message manipulation attacks. Specifically, the theoretical analysis and simulation results are first provided to demonstrate that the maximum consensus based time synchronization (MTS) protocol would be invalid under message manipulation attacks. Then, a novel secured maximum consensus based time synchronization (SMTS) protocol is proposed to detect and invalidate message manipulation attacks. Furthermore, we prove that SMTS is guaranteed to converge with simultaneous compensation of both clock skew and offset. Extensive numerical results show the effectiveness of our proposed protocol.


global communications conference | 2014

Secure key establishment for Device-to-Device communications

Wenlong Shen; Weisheng Hong; Xianghui Cao; Bo Yin; Devu Manikantan Shila; Yu Cheng

With the rapid growth of smartphone and tablet users, Device-to-Device (D2D) communications have become an attractive solution for enhancing the performance of traditional cellular networks. However, relevant security issues involved in D2D communications have not been addressed yet. In this paper, we investigate the security requirements and challenges for D2D communications, and present a secure and efficient key agreement protocol, which enables two mobile devices to establish a shared secret key for D2D communications without prior knowledge. Our approach is based on the Diffie-Hellman key agreement protocol and commitment schemes. Compared to previous work, our proposed protocol introduces less communication and computation overhead. We present the design details and security analysis of the proposed protocol. We also integrate our proposed protocol into the existing Wi-Fi Direct protocol, and implement it using Android smartphones.


IEEE Journal on Selected Areas in Communications | 2014

Cognitive Radio Based State Estimation in Cyber-Physical Systems

Xianghui Cao; Peng Cheng; Jiming Chen; Shuzhi Sam Ge; Yu Cheng; Youxian Sun

We investigate the state estimation problem in cyber-physical systems (CPS) where the dynamical physical process is measured by a wireless sensor and the measurements are transmitted to a remote state estimator. It has been shown that the estimation performance strongly depends on the wireless communication quality. To enhance the estimation performance, we apply the cognitive radio technique to the system and propose a CHAnnel seNsing and switChing mEchanism (CHANCE) to explore opportunistic accessibility of multiple channels. We consider two types of wireless channels, i.e., one unlicensed channel which can be accessed freely and several licensed channels which have been pre-assigned to primary users. For the single-licensed-channel case, we develop a necessary condition for the estimation stability based on the physical process dynamics, channel quality and the channel sensing accuracy. This condition becomes also sufficient under certain conditions. We also derive the conditions under which the estimation performance is guaranteed to be improved by CHANCE. The above results are then extended to multi-licensed-channel cases. Simulations based on a particular linear system show that, the long-run mean estimation error covariance with CHANCE is at least 63% less than that without CHANCE. It is also shown that CHANCE outperforms the existing RANDOM mechanism in terms of estimation performance.


communications and mobile computing | 2011

Measuring the performance of movement-assisted certificate revocation list distribution in VANET

Jiming Chen; Xianghui Cao; Yu Zhang; Weiqiang Xu; Youxian Sun

Vehicular Ad hoc Network (VANET) emerges as a promising technology and has chances of very likely to be deployed in the coming years. The security of vehicular networks will be an important way to facilitate road safety. In this paper, we are concerned with the problem of effective and efficient distribution of the certificate revocation units (RSUs) in vehicular networks. We propose a novel distributed approach by introducing mobile nodes that have public safety. An optimal route for mobile nodes is designed to cover blind areas under both delay and cost constraints. The performances of the movement-assisted approach are measured and evaluated by extensive experiments in large scale networks for Certificate Revocation List (CRL) distribution in VANET. The results show that the proposed movement-assisted approach obviously improves the performance. Copyright


Computers & Electrical Engineering | 2009

An optimal control method for applications using wireless sensor/actuator networks

Xianghui Cao; Jiming Chen; Chuanhou Gao; Youxian Sun

The wireless sensor/actuator networks (WSANs) can be used for spatially distributed control systems. With smart sensors and actuators, the WSANs are able to not only sense the control system states and report measurements, but also perform control and actuation. This paper investigates WSANs on their ability of control. A centralized controller is introduced into WSANs to make up closed-loop control systems, in which control decisions are made based on global network-wide information. A model of the control and communication over WSANs is made theoretically, based on which we achieved an optimal control method. It is demonstrated by simulations that the control method proposed could stabilize the control system quickly.


Iet Communications | 2015

Sociality-aware resource allocation for device-to-device communications in cellular networks

Li Wang; Lu Liu; Xianghui Cao; Xiaohua Tian; Yu Cheng

Exploiting direct transmissions between geographically close mobile users without passing through the base stations, device-to-device (D2D) communications contribute significant improvement to the spectral efficiency of cellular networks. In D2D-assisted cellular networks, the social interaction of mobile users is an important property that will affect the practical performance and should be seriously accounted in the network resource allocation, which is yet to be fully explored. In this study, the authors investigate the social interactions for D2D transmissions and develop a contact time model to characterise the D2D links. A D2D link can be considered for resource allocation only when the two users encounter and their contact time is enough long to complete a meaningful transmission. They formulate and compare both sociality-blind and sociality-aware optimisation problems for resource allocation in D2D-assisted cellular networks. Extensive numerical results are presented, validating that the sociality-aware resource allocation can achieve higher performance than that of the sociality-blind approach.

Collaboration


Dive into the Xianghui Cao's collaboration.

Top Co-Authors

Avatar

Yu Cheng

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lu Liu

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Wenlong Shen

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bo Yin

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Lin Cai

University of Victoria

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Devu Manikantan Shila

Illinois Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge