Bin Cao

Bin Cao
Beijing University of Posts and Telecommunications | BUPT · Department of Communication Engineering

phd

About

50
Publications
22,620
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,952
Citations

Publications

Publications (50)
Article
Full-text available
Introducing blockchain into Federated Learning (FL) to build a trusted edge computing environment for transmission and learning has attracted widespread attention as a new decentralized learning pattern. However, traditional consensus mechanisms and architectures of blockchain systems face significant challenges in handling large-scale FL tasks, es...
Article
Ensuring secure access to cellular networks is of paramount importance, in which system information (SI) protection plays a crucial role at the initial access stage. While the 3rd generation partnership project (3GPP) released many standardizations to enhance SI protection for preventing users from false base station (FBS) attacks, most of them are...
Article
Isolatability and scalability are two critical issues faced by blockchain. Blockchain interoperability addresses isolatability between heterogeneous blockchains, while sharding-based blockchain achieves scalability by solving isolatability of homogeneous blockchains running in different shards. To ensure atomicity between different blockchains, the...
Article
Different from “read” based Web1 and “read-write” based Web2, “read-write-own” based Web3 is proposed as a typical user-centric Internet to open the new generation of the World Wide Web. Web3 is the internet religious fundamentalism for data rights owned by users based on identity, data, network, and service, which requires the support of full-proc...
Article
Full-text available
In the context of the burgeoning Industrial Internet of Things (IIoT), the proliferation of interconnected devices has created a reservoir of data resources distributed across diverse domains. However, due to the conflict between proprietary data and the use of data, it is a challenge to fully obtain data value in an efficient and legal way. To rel...
Article
To securely integrate Mobile Edge Computing (MEC) into Wireless Blockchain Network (WBN), this paper proposes a framework for blockchain based offloading strategy, where blockchain nodes are categorized as blockchain users and blockchain miners from a motivation perspective. Particularly, aiming at improving the motivation ability, a block generati...
Article
In the past decade, blockchain has shown a promising vision to build trust without any powerful third party in a secure, decentralized and scalable manner. However, due to the wide application and future development from cryptocurrency to the Internet of things, blockchain is an extremely complex system enabling integration with mathematics, comput...
Article
Fog Radio Access Network (F-RAN) has been regarded as a promising solution to alleviate the ever-increasing traffic burden on current and future wireless networks, for it shifts the caching and computing resources from remote cloud to the network edge. However, it makes wireless networks more vulnerable to security attacks as well. To resolve this...
Chapter
Blockchain has been regarded as a promising technology for IoT because it provides significant solutions for decentralized networks that can address trust and security concerns, high maintenance cost problems, and so on. The decentralization provided by blockchain can be largely attributed to the use of a consensus mechanism, which enables peer‐to‐...
Chapter
One critical step in deploying blockchain in wireless communication networks is to understand the relationship between communications and blockchain, as well as the performance constraints posing on their counterparts. As such, in this chapter, we aim at establishing an analytical model for blockchain‐enabled wireless IoT systems by modeling their...
Chapter
Mobile edge computing (MEC) sinks computing power to the edge of networks and integrates mobile access networks and Internet services in 5G and beyond. With the continuous development of services, heterogeneous MEC systems were proposed to carry out the massive and complex computing services. However, when it comes to multiserver collaboration, tru...
Article
Blockchain is built on a peer-to-peer network that relies on frequent communications among distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determine blockchain security bounds (i.e., fault tolerances) and other key performance metr...
Article
Full-text available
Blockchain is built on a peer-to-peer network that relies on frequent communications among the distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determines blockchain security bound and other key performance metrics such as transacti...
Conference Paper
Full-text available
The design of sharding aims to solve the scalability challenge in a blockchain network. Typically, by splitting the whole blockchain network into smaller shards, the transaction throughput can be significantly improved. However, distributing fewer attesting nodes for transactions in a shard may cause higher security risks. This paper analyzes the s...
Preprint
Full-text available
In the past decade, blockchain has shown a promising vision greatly to build the trust without any powerful third party in a secure, decentralized and salable manner. However, due to the wide application and future development from cryptocurrency to Internet of Things, blockchain is an extremely complex system enabling integration with mathematics,...
Article
Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...
Preprint
Full-text available
Blockchain is built on a peer-to-peer network that relies on frequent communications among the distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determines blockchain security bound and other key performance metrics such as transacti...
Article
Full-text available
Practical Byzantine Fault Tolerance (PBFT) consensus mechanism shows a great potential to break the performance bottleneck of the Proof-of-Work (PoW) based blockchain systems, which typically support only dozens of transactions per second and require minutes to hours for transaction confirmation. However, due to frequent inter-node communications,...
Article
Full-text available
Massive Multiple-Input-Multiple-Output (MIMO) is a promising technology to meet the demand for connection of massive devices and high data capacity for mobile networks in the next generation communication system. However, due to the massive connectivity of mobile devices, the pilot contamination problem will severely degrade the communication quali...
Article
Full-text available
Unmanned Aerial Vehicle (UAV) is emerged as a promising technology for the support of human activities, such as target tracking, disaster rescue and surveillance. However, these tasks require a large computation load of image or video processing, which imposes huge pressure on the UAV computation platform. To solve this issue, in this work, we prop...
Article
Direct Acyclic Graph (DAG)-based blockchain and the corresponding consensus algorithm has been identified as a promising technology for Internet of Things (IoT). Compared with Proof-of-Work (PoW) and Proof-of-Stake (PoS) that have been widely used in the existing blockchains, the consensus algorithm designed based on DAG structure (simply called as...
Preprint
Full-text available
The sixth generation (6G) network must provide performance superior to previous generations in order to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, even higher reliability, sub 1 millisecond latency and ubiquitous connection for Internet of Everything. However, with the scarcity of spectrum...
Article
Full-text available
The sixth generation (6G) network must provide performance superior to previous generations in order to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, even higher reliability, sub 1 millisecond latency and ubiquitous connection for Internet of Everything. However, with the scarcity of spectrum...
Article
Full-text available
Blockchain shows great potential to be applied in wireless IoT ecosystems for establishing the trust and consensus mechanisms without central authority's involvement. Based on RAFT consensus mechanism, this paper investigates the security performance of wireless blockchain networks in the presence of malicious jamming. We first map and model the bl...
Conference Paper
Keeping patients sensitive information secured and untampered in the e-Health system is of paramount importance. Emerging as a promising technology to build a secure and reliable distributed ledger, blockchain can protect its data from being falsified, which has attracted much attention from both academia and industry. However, with limited computa...
Article
Full-text available
Recently, fog computing-based radio resource networks (F-RAN) have been conceptualized to provide high quality-of-experience (QoE) for adaptive bitrate (ABR) streaming, where additional computing capacity is supplemented on fog nodes to facilitate complicated cross-layer optimization, i.e., joint bitrate selection and radio resource allocation. How...
Article
Full-text available
In the blockchain, the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks. Various blockchain consensus mechanisms have been proposed. However, there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific...
Article
Full-text available
The impact of communication transmission delay on the original blockchain, has not been well considered and studied since it is primarily designed in stable wired communication environment with high communication capacity. However, in a wireless scenario, due to the scarcity of spectrum resource, a blockchain user may have to compete for wireless c...
Article
In order to improve life mobile users' service experience, mobile cloud computing (MCC) is promoted, which can offload these compute-intensive applications to cloud. Although MCC can alleviate the burdens of Smart mobile devices (SMDs), it also aggravates the computing and storage overheads in cloud center and bandwidth overhead on wireless links f...
Conference Paper
Blockchain has shown a great potential for Internet of Things (IoT) systems to establish trust and consensus mechanisms with no involvement of any third party. It has been not clear how the low complexity devices and the wireless communications among them can pose constraints on the blockchain enabled IoT systems. In this paper, we establish a fund...
Conference Paper
In this paper, we investigate the impact of network load on the Direct Acyclic Graph (DAG) consensus process for the blockchain enabled Internet of Things. Specifically, Markov chain model has been adopted to illustrate the dynamics in the consensus process for DAG based blockchain networks. The key performance metrics including cumulative weight a...
Article
Full-text available
Wireless network virtualization (WNV) has been a hot topic recently, which can provide the customized service to construct virtual networks for various requirements quickly and flexibly by resource sharing. However, most of the traffic is generated by duplicate downloads for a few popular contents. Meanwhile, due to the isolation in the existing WN...
Preprint
Full-text available
Direct Acyclic Graph (DAG) based blockchain and the corresponding consensus mechanism has been identified as a promising technology for Internet of Things (IoT). Compared with Proof-of-Work (PoW) and Proof-of-Stake (PoS) that have been widely used in the existing blockchains, the consensus mechanism designed based on DAG architecture (simply called...
Preprint
Full-text available
Blockchain has been regarded as a promising technology for Internet of Things (IoT), since it provides significant solutions for decentralized network which can address trust and security concerns, high maintenance cost problem, etc. The decentralization provided by blockchain can be largely attributed to the use of consensus mechanism, which enabl...
Article
Recently, as the development of artificial intelligence (AI), data-driven AI methods have shown amazing performance in solving complex problems to support the Internet of Things (IoT) world with massive resource-consuming and delay-sensitive services. In this paper, we propose an intelligent Resource Allocation Framework (iRAF) to solve the complex...
Article
Full-text available
Blockchain has shown a great potential in Internet of Things (IoT) ecosystems for establishing trust and consensus mechanisms without involvement of any third party. Understanding the relationship between communication and blockchain as well as the performance constraints posing on the counterparts can facilitate designing a dedicated blockchain-en...
Article
Full-text available
Blockchain has been regarded as a promising technology for Internet of Things (IoT), since it provides significant solutions for decentralized network which can address trust and security concerns, high maintenance cost problem, etc. The decentralization provided by blockchain can be largely attributed to the use of consensus mechanism, which enabl...
Article
Multi-access edge computing (MEC), which is deployed in the proximity area of the mobile user side as a supplement to the traditional remote cloud center, has been regarded as a promising technique for 5G heterogeneous networks. With the assistance of MEC, mobile users can access computing resource effectively. Also, congestion in the core network...
Article
With the exponentially increasing number of mobile devices, crowdsensing has been a hot topic to use the available resource of neighbor mobile devices to perform sensing tasks cooperatively. However, there still remain three main obstacles to be solved in the practical system. First, since mobile devices are selfish and rational, it is natural to p...
Article
The resource reservation is one of the most key techniques to ensure the Quality-of-Service (QoS) of a multimedia application. In mobile cloud computing (MCC), The resource reservation and allocation (RRA) in advance can also significantly reduce the total provisioning cost of cloud service providers. However, the uncertain features of mobile users...
Article
In order to achieve better system performance, the concept of an ad-hoc mobile cloud, whereby a mobile device can access resources such as processing, data or storage at other neighbouring nodes, has been proposed. The difficulty that arises with this concept is the mobility of nearby devices, i.e. a neighboring device may move out of range before...
Article
In wireless networks, retransmissions are used by senders to recover lost packets. The conventional retransmission schemes usually retransmit only one lost packet each time, resulting in a low retransmission efficiency. However, using broadcasting nature of a wireless channel with network coding (NC), we can recover more than one lost packet per tr...
Article
In the hybrid LTE cellular network with D2D (Device-to-Device) communication, D2D communication technologies can improve the spectral efficiency significantly. However, the D2D users have to reutilize the spectrum which is allocated to the cellular users. Therefore, the co-channel interference will be more complicated in the case of cross-cell D2D...

Network

Cited By