Yixin Jiang
China Southern Power Grid Company
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yixin Jiang.
communications and networking symposium | 2013
Yuanpeng Xie; Jinsong Zhang; Ge Fu; Hong Wen; Qiyi Han; Xiping Zhu; Yixin Jiang; Xiaobin Guo
The combination of WSNs and cloud computing actually does overcome the problems such as storage issues, real-time processing aporia, and ubiquitous accessibility challenge due to the low-power, small-size characteristics of WSNs. But there still exist some other issues, particularly security issues. In this paper, we present a pub/sub based framework of the combination paradigm, and we discuss about the advantages and disadvantages including the security challenges of the new paradigm. Finally, the solutions to security problem will be presented at last.
conference on industrial electronics and applications | 2016
Jianli Huang; Huajun Chen; Yixin Jiang; Jiaxiao Meng; Aidong Xu; Xiaobin Guo; Baoren Chen
In this paper, we consider a transmit precoder design for multiple-input-multiple-output (MIMO) decode-and-forward (DF) half-duplex two-hop relaying system consisting of one transmitter, one relay, one information-decoding (ID) receiver, and one energy harvesting (EH) receiver, where all nodes are equipped with more than one antenna. Our objective is to maximize data rates of this system by designing precoders at source and relay. We can jointly optimalize two precoding matrices using some numerical methods such as CVX after transforming the original problem into a convex problem. Moreover, we also use a suboptimal method to reduce computation complexity of the precoder design. Numerical results show that we achieved comparable data rate to the optimal precoding even when the coefficients for linear combining are restricted to real numbers.
conference on industrial electronics and applications | 2016
Yuan Lin; Jianli Huang; Huajun Chen; Liming Chen; Fuzheng Zhang; Yixin Jiang; Aidong Xu; Xiaobin Guo; Baoren Chen
In this paper, considering the decode-and-forward (DF) relay scheme, we study the optimal design of power allocation for orthogonal frequency division multiplexing (OFDM) secure communication, where the relay carries out wireless information and power transfer (WIPT) by time switching(TS) scheme. Our objective is to maximize the achievable secrecy rate subject to the power constraint of the source and the energy harvesting (EH) relay. However, the problems are non-convex. By exploiting their special structure, we equivalently transform the non-convex optimization problem into a quasi-convex problem and solve it by a simple algorithm using bisection. At each step of the algorithm, we will solve a convex feasibility problem by the Karush-Kuhn-Tucker (KKT) conditions and obtain the closed-form solution. At the end, simulation results verify that the proposed optimal solution outperforms that for conventional equal power solutions.
IEEE Transactions on Cloud Computing | 2016
Yuanpeng Xie; Hong Wen; Bin Wu; Yixin Jiang; Jiaxiao Meng
Abstract—Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on-demand. It is an emerging but promising paradigm to integrating mobile devices into cloud computing, and the integration performs in the cloud based hierarchical multi-user data-shared environment. With integrating into cloud computing, security issues such as data confidentiality and user authority may arise in the mobile cloud computing system, and it is concerned as the main constraints to the developments of mobile cloud computing. In order to provide safe and secure operation, a hierarchical access control method using modified hierarchical attribute-based encryption (M-HABE) and a modified three-layer structure is proposed in this paper. In a specific mobile cloud computing model, enormous data which may be from all kinds of mobile devices, such as smart phones, functioned phones and PDAs and so on can be controlled and monitored by the system, and the data can be sensitive to unauthorized third party and constraint to legal users as well. The novel scheme mainly focuses on the data processing, storing and accessing, which is designed to ensure the users with legal authorities to get corresponding classified data and to restrict illegal users and unauthorized legal users get access to the data, which makes it extremely suitable for the mobile cloud computing paradigms.
communications and networking symposium | 2014
Jie Tang; Huan Huan Song; Fei Pan; Hong Wen; Bin Wu; Yixin Jiang; Xiaobin Guo; Zhen Chen
This paper proposed a MIMO cross-layer precoding secure communications via pattern controlled by higher layer cryptography. By contrast to physical layer security system, the proposed scheme could enhance the security in adverse situations where the physical layer security hardly to be deal with. Two One typical situation is considered. One is that the attackers have the ideal CSI and another is eavesdroppers channel are highly correlated to legitimate channel. Our scheme integrates the upper layer with physical layer secure together to gaurantee the security in real communication system. Extensive theoretical analysis and simulations are conducted to demonstrate its effectiveness. The proposed method is feasible to spread in many other communicate scenarios.
communications and networking symposium | 2013
Yixin Jiang; Xiaobin Guo; Chao Li; Hong Wen; Cai Lei; Zhang Rui
The smart grid is a modern power grid infrastructure. As the power information integrates into Internet, it raises a challenge on security which threats the power system. To ensure the security of sensitive clouding data of electric power system, the straightforward approach is to encrypt such sensitive data. However, traditional cryptographic methods will cause the cipher-text difficult to be efficiently queried. Particularly, it becomes more difficult to deploy such scheme for mobile devices in smart grid, considering that they are usually computation-limited and storage-limited. In this paper, based on the existing schemes for searchable encryption on clouding database, we proposed an efficient, secure, and scalable scheme to address this challenge issue. The performance evaluation and security analysis demonstrate the validity and practicality of the proposed scheme.
communications and networking symposium | 2016
Jianli Huang; Yixin Jiang; Aidong Xu; Hong Wen; Huajun Chen; Xiaobin Guo; Zewu Guan; Zhiming Wang
The antenna subarray formation (ASF) is a promising technique for multiple-input multiple-output (MIMO) receiver. For MIMO wiretap channels, we employ the ASF matrix at the legitimate receiver and propose new alternative optimization (AO) scheme which jointly designs transmit covariance matrix and ASF matrix to maximize the secrecy capacity. Simulation results have shown that the proposed ASF schemes outperform the conventional antenna selection scheme under the same number of radio frequency (RF) chains.
vehicular technology conference | 2015
Yuanpeng Xie; Hong Wen; Jinsong Wu; Yixin Jiang; Jiaxiao Meng; Xiaobin Guo; Aidong Xu; Zewu Guan
Cloud computing is an Internet-based computing paradigm which may share resources to provide on-demand services to devices. Integrating smart grid into cloud computing is emerging and promising, and this integration may execute in the cloud based hierarchical multi-user data-shared environment, where security issues such as data confidentiality and manager authority may arise in the smart grid system. In order to provide safe and secure grid operations, a hierarchical access control method using modified hierarchical attribute-based encryption (M-HABE) and a modified three layers structure are proposed in this paper. In power grids, the system can be controlled and monitored by the enormous sensitive data which may be from sensor nodes, smart measurement units and soon on. The novel scheme mainly focus on the data process, storage and access to ensure the managers with legal authorities to get corresponding sensitive data and restrict illegal managers and unauthorized legal managers from accessing the data.
communications and networking symposium | 2014
Ting Ma; Yixin Jiang; Hong Wen; Bin Wu; Xiaobin Guo; Zhen Chen
The paper presents the mutual message authentication scheme for the two-way communication smart meter system, where the Public Key Infrastructure (PKI) based Physical Layer Assist Mutual Authentication (PLAMA) scheme is introduced. The proposed scheme is designed to guarantee the message sent by the expected source can only be fully received by the expected destination while the expected destination also can authenticate the message from the expected source. The proposed scheme can achieve lightweight and fast authentication, which yield the lower time delay for mutual authentication and can satisfy the requirement of the real-time control over the smart grid.
communications and networking symposium | 2013
Qiyi Han; Yu Lin; Rui Zhang; Hong Wen; Yuanpeng Xie; Xiping Zhu; Yixin Jiang; Xiaobin Guo
Due to their open, distribution and anonymous nature, P2P systems are extremely susceptible to malicious users spreading harmful content. It is important to develop effective and efficient reputation based global trust model. This paper proposes a topological potential method derived from social network analysis to measure the recommendation degree of the recommended trust nodes by taken into account both the status and reputation. Having considered the reputation for each node and trust measurement between them, the method could appraise the integrated recommendation degree of P2P recommended trust nodes objectively. Thus, the goal to create the trust model is achieved by the help of selecting trust nodes effectively.