About
50
Publications
22,620
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,952
Citations
Publications
Publications (50)
Introducing blockchain into Federated Learning (FL) to build a trusted edge computing environment for transmission and learning has attracted widespread attention as a new decentralized learning pattern. However, traditional consensus mechanisms and architectures of blockchain systems face significant challenges in handling large-scale FL tasks, es...
Ensuring secure access to cellular networks is of paramount importance, in which system information (SI) protection plays a crucial role at the initial access stage. While the 3rd generation partnership project (3GPP) released many standardizations to enhance SI protection for preventing users from false base station (FBS) attacks, most of them are...
Isolatability and scalability are two critical issues faced by blockchain. Blockchain interoperability addresses isolatability between heterogeneous blockchains, while sharding-based blockchain achieves scalability by solving isolatability of homogeneous blockchains running in different shards. To ensure atomicity between different blockchains, the...
Different from “read” based Web1 and “read-write” based Web2, “read-write-own” based Web3 is proposed as a typical user-centric Internet to open the new generation of the World Wide Web. Web3 is the internet religious fundamentalism for data rights owned by users based on identity, data, network, and service, which requires the support of full-proc...
In the context of the burgeoning Industrial Internet of Things (IIoT), the proliferation of interconnected devices has created a reservoir of data resources distributed across diverse domains. However, due to the conflict between proprietary data and the use of data, it is a challenge to fully obtain data value in an efficient and legal way. To rel...
To securely integrate Mobile Edge Computing (MEC) into Wireless Blockchain Network (WBN), this paper proposes a framework for blockchain based offloading strategy, where blockchain nodes are categorized as blockchain users and blockchain miners from a motivation perspective. Particularly, aiming at improving the motivation ability, a block generati...
In the past decade, blockchain has shown a promising vision to build trust without any powerful third party in a secure, decentralized and scalable manner. However, due to the wide application and future development from cryptocurrency to the Internet of things, blockchain is an extremely complex system enabling integration with mathematics, comput...
Fog Radio Access Network (F-RAN) has been regarded as a promising solution to alleviate the ever-increasing traffic burden on current and future wireless networks, for it shifts the caching and computing resources from remote cloud to the network edge. However, it makes wireless networks more vulnerable to security attacks as well. To resolve this...
Blockchain has been regarded as a promising technology for IoT because it provides significant solutions for decentralized networks that can address trust and security concerns, high maintenance cost problems, and so on. The decentralization provided by blockchain can be largely attributed to the use of a consensus mechanism, which enables peer‐to‐...
One critical step in deploying blockchain in wireless communication networks is to understand the relationship between communications and blockchain, as well as the performance constraints posing on their counterparts. As such, in this chapter, we aim at establishing an analytical model for blockchain‐enabled wireless IoT systems by modeling their...
Mobile edge computing (MEC) sinks computing power to the edge of networks and integrates mobile access networks and Internet services in 5G and beyond. With the continuous development of services, heterogeneous MEC systems were proposed to carry out the massive and complex computing services. However, when it comes to multiserver collaboration, tru...
Blockchain is built on a peer-to-peer network that relies on frequent communications among distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determine blockchain security bounds (i.e., fault tolerances) and other key performance metr...
Blockchain is built on a peer-to-peer network that relies on frequent communications among the distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determines blockchain security bound and other key performance metrics such as transacti...
The design of sharding aims to solve the scalability challenge in a blockchain network. Typically, by splitting the whole blockchain network into smaller shards, the transaction throughput can be significantly improved. However, distributing fewer attesting nodes for transactions in a shard may cause higher security risks. This paper analyzes the s...
In the past decade, blockchain has shown a promising vision greatly to build the trust without any powerful third party in a secure, decentralized and salable manner. However, due to the wide application and future development from cryptocurrency to Internet of Things, blockchain is an extremely complex system enabling integration with mathematics,...
Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...
Blockchain is built on a peer-to-peer network that relies on frequent communications among the distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determines blockchain security bound and other key performance metrics such as transacti...
Practical Byzantine Fault Tolerance (PBFT) consensus mechanism shows a great potential to break the performance bottleneck of the Proof-of-Work (PoW) based blockchain systems, which typically support only dozens of transactions per second and require minutes to hours for transaction confirmation. However, due to frequent inter-node communications,...
Massive Multiple-Input-Multiple-Output (MIMO) is a promising technology to meet the demand for connection of massive devices and high data capacity for mobile networks in the next generation communication system. However, due to the massive connectivity of mobile devices, the pilot contamination problem will severely degrade the communication quali...
Unmanned Aerial Vehicle (UAV) is emerged as a promising technology for the support of human activities, such as target tracking, disaster rescue and surveillance. However, these tasks require a large computation load of image or video processing, which imposes huge pressure on the UAV computation platform. To solve this issue, in this work, we prop...
Direct Acyclic Graph (DAG)-based blockchain and the corresponding consensus algorithm has been identified as a promising technology for Internet of Things (IoT). Compared with Proof-of-Work (PoW) and Proof-of-Stake (PoS) that have been widely used in the existing blockchains, the consensus algorithm designed based on DAG structure (simply called as...
The sixth generation (6G) network must provide performance superior to previous generations in order to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, even higher reliability, sub 1 millisecond latency and ubiquitous connection for Internet of Everything. However, with the scarcity of spectrum...
The sixth generation (6G) network must provide performance superior to previous generations in order to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, even higher reliability, sub 1 millisecond latency and ubiquitous connection for Internet of Everything. However, with the scarcity of spectrum...
Blockchain shows great potential to be applied in wireless IoT ecosystems for establishing the trust and consensus mechanisms without central authority's involvement. Based on RAFT consensus mechanism, this paper investigates the security performance of wireless blockchain networks in the presence of malicious jamming. We first map and model the bl...
Keeping patients sensitive information secured and untampered in the e-Health system is of paramount importance. Emerging as a promising technology to build a secure and reliable distributed ledger, blockchain can protect its data from being falsified, which has attracted much attention from both academia and industry. However, with limited computa...
Recently, fog computing-based radio resource networks (F-RAN) have been conceptualized to provide high quality-of-experience (QoE) for adaptive bitrate (ABR) streaming, where additional computing capacity is supplemented on fog nodes to facilitate complicated cross-layer optimization, i.e., joint bitrate selection and radio resource allocation. How...
In the blockchain, the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks. Various blockchain consensus mechanisms have been proposed. However, there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific...
The impact of communication transmission delay on the original blockchain, has not been well considered and studied since it is primarily designed in stable wired communication environment with high communication capacity. However, in a wireless scenario, due to the scarcity of spectrum resource, a blockchain user may have to compete for wireless c...
In order to improve life mobile users' service experience, mobile cloud computing (MCC) is promoted, which can offload these compute-intensive applications to cloud. Although MCC can alleviate the burdens of Smart mobile devices (SMDs), it also aggravates the computing and storage overheads in cloud center and bandwidth overhead on wireless links f...
Blockchain has shown a great potential for Internet of Things (IoT) systems to establish trust and consensus mechanisms with no involvement of any third party. It has been not clear how the low complexity devices and the wireless communications among them can pose constraints on the blockchain enabled IoT systems. In this paper, we establish a fund...
In this paper, we investigate the impact of network load on the Direct Acyclic Graph (DAG) consensus process for the blockchain enabled Internet of Things. Specifically, Markov chain model has been adopted to illustrate the dynamics in the consensus process for DAG based blockchain networks. The key performance metrics including cumulative weight a...
Wireless network virtualization (WNV) has been a hot topic recently, which can provide the customized service to construct virtual networks for various requirements quickly and flexibly by resource sharing. However, most of the traffic is generated by duplicate downloads for a few popular contents. Meanwhile, due to the isolation in the existing WN...
Direct Acyclic Graph (DAG) based blockchain and the corresponding consensus mechanism has been identified as a promising technology for Internet of Things (IoT). Compared with Proof-of-Work (PoW) and Proof-of-Stake (PoS) that have been widely used in the existing blockchains, the consensus mechanism designed based on DAG architecture (simply called...
Blockchain has been regarded as a promising technology for Internet of Things (IoT), since it provides significant solutions for decentralized network which can address trust and security concerns, high maintenance cost problem, etc. The decentralization provided by blockchain can be largely attributed to the use of consensus mechanism, which enabl...
Recently, as the development of artificial intelligence (AI), data-driven AI methods have shown amazing performance in solving complex problems to support the Internet of Things (IoT) world with massive resource-consuming and delay-sensitive services. In this paper, we propose an intelligent Resource Allocation Framework (iRAF) to solve the complex...
Blockchain has shown a great potential in Internet of Things (IoT) ecosystems for establishing trust and consensus mechanisms without involvement of any third party. Understanding the relationship between communication and blockchain as well as the performance constraints posing on the counterparts can facilitate designing a dedicated blockchain-en...
Blockchain has been regarded as a promising technology for Internet of Things (IoT), since it provides significant solutions for decentralized network which can address trust and security concerns, high maintenance cost problem, etc. The decentralization provided by blockchain can be largely attributed to the use of consensus mechanism, which enabl...
Multi-access edge computing (MEC), which is deployed in the proximity area of the mobile user side as a supplement to the traditional remote cloud center, has been regarded as a promising technique for 5G heterogeneous networks. With the assistance of MEC, mobile users can access computing resource effectively. Also, congestion in the core network...
With the exponentially increasing number of mobile devices, crowdsensing has been a hot topic to use the available resource of neighbor mobile devices to perform sensing tasks cooperatively. However, there still remain three main obstacles to be solved in the practical system. First, since mobile devices are selfish and rational, it is natural to p...
The resource reservation is one of the most key techniques to ensure the Quality-of-Service (QoS) of a multimedia application. In mobile cloud computing (MCC), The resource reservation and allocation (RRA) in advance can also significantly reduce the total provisioning cost of cloud service providers. However, the uncertain features of mobile users...
In order to achieve better system performance, the concept of an ad-hoc mobile cloud, whereby a mobile device can access resources such as processing, data or storage at other neighbouring nodes, has been proposed. The difficulty that arises with this concept is the mobility of nearby devices, i.e. a neighboring device may move out of range before...
In wireless networks, retransmissions are used by senders to recover lost packets. The conventional retransmission schemes usually retransmit only one lost packet each time, resulting in a low retransmission efficiency. However, using broadcasting nature of a wireless channel with network coding (NC), we can recover more than one lost packet per tr...
In the hybrid LTE cellular network with D2D (Device-to-Device) communication, D2D communication technologies can improve the spectral efficiency significantly. However, the D2D users have to reutilize the spectrum which is allocated to the cellular users. Therefore, the co-channel interference will be more complicated in the case of cross-cell D2D...