Hao Xu

Hao Xu
Tongji University · College of Electronics and Information Engineering

PhD

About

56
Publications
28,848
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,179
Citations
Introduction
Hao Xu's current research direction is wireless communication blockchain. He has developed the generic model of wireless blockchain communication. MSc Avinoics @ Cranfield University BSc Aerospace @ University of Sheffield PhD-ongoing Wireless Communication and consensus @University of Glasgow
Additional affiliations
September 2020 - November 2021
China Mobile Research Institute
Position
  • Researcher
Education
May 2019 - April 2022
University of Glasgow
Field of study
  • WIreless Communication

Publications

Publications (56)
Preprint
Full-text available
Radio Access Networks (RAN) tends to be more distributed in the 5G new radio in order to provide low latency and flexible on-demanding services. In this paper, Blockchain-enabled Radio Access Networks (BE-RAN) is proposed as a novel decentralized RAN architecture to facilitate enhanced security and privacy on identification and authentication. It c...
Conference Paper
Full-text available
Metaverse depicts a vista of constructing a virtual environment parallel to the real world so people can communicate with others and objects through digital entities. In the real world, communication relies on identities and addresses that are recognized by authorities, no matter the link is established via post, email, mobile phone, or landline. M...
Article
Full-text available
Web3 brings an emerging outlook for the value of decentralization, boosting the decentralized infrastructure. People can benefit from Web3, facilitated by the advances in distributed ledger technology, to read, write and own web content, services and applications more freely without revealing their real identities. Although the features and merits...
Preprint
Full-text available
Web 3.0 opens the world of new existence of the crypto-network-entity, which is independently defined by the public key pairs for entities and the connection to the Web 3.0 cyberspace. In this paper, we first discover a spacetime coordinate system based on fractal polytope in any dimensions with discrete time offered by blockchain and consensus. Se...
Preprint
Full-text available
Blockchain has the potential to reform the architecture of cyberspace and transform the storage, circulation and exchange of information through decentralization, transparency and de-identification. Meaning that ordinary participants can become traders, miners, retailers, and customers simultaneously, breaking the barriers and reducing the informat...
Article
In Byzantine fault-tolerant (BFT) systems, maintaining consistency amidst malicious replicas is crucial, especially for blockchain systems. Recent innovations in this field have integrated multiple leaders into the BFT consensus mechanism to boost scalability and efficiency. However, the existing approaches often lead to excessive consumption of st...
Preprint
Full-text available
Blockchain technology holds promise for Web 3.0, but scalability remains a critical challenge. Here, we present a mathematical theory for a novel blockchain network topology based on fractal N-dimensional simplexes. This Hyper-simplex fractal network folds one-dimensional data blocks into geometric shapes, reflecting both underlying and overlaying...
Preprint
The Internet of Vehicles (IoV), which enables interactions between vehicles, infrastructure, and the environment, faces challenges in maintaining communication security and reliable automated decisions. This paper introduces a decentralized framework comprising a primary layer for managing inter-vehicle communication and a sub-layer for securing in...
Preprint
Blockchain is widely applied in logistics, finance, and agriculture. As single blockchain users grow, scalability becomes crucial. However, existing works lack a comprehensive summary of blockchain scalability. They focus on single chains or cross-chain technologies. This survey summarizes scalability across the physical and logical layers, as well...
Article
Full-text available
The rapid development of the Internet of Vehicles using centralized systems faces significant challenges, including reliability and security vulnerabilities and high latency. This paper introduces a blockchain-enabled authentication and communication network for scalable IoV to enhance security, reduce latency, and relieve the dependency on central...
Conference Paper
The protocols of distributed consensus normally aim to tolerate different types of faults including crash faults and byzantine faults that occur in the distributed systems. However, the dynamic network topology and stochastic wireless channels may cause the same trustworthy system to suffer both crash fault and byzantine fault. This article propose...
Preprint
This paper aims to balance performance and cost in a two-hop wireless cooperative communication network where the source and relays have contradictory optimization goals and make decisions in a distributed manner. This differs from most existing works that have typically assumed that source and relay nodes follow a schedule created implicitly by a...
Preprint
Full-text available
In an era of increasing concerns over intellectual property rights, traditional peer review systems face challenges including plagiarism, malicious attacks, and unauthorized data access. BeerReview, a blockchain-enabled peer review platform, offers a robust solution, enabling experts and scholars to participate actively in the review process withou...
Article
Due to the explosion of mobile users and the ever-increasing heterogeneity and scale of wireless networks, traditional communication protocols and optimizing methods can not satisfy future wireless network (FWN) requirements. As promising technologies, artificial intelligence (AI) and blockchain are deemed as the solution for the FWN. AI, famous fo...
Article
This paper aims to balance performance and cost in a two-hop wireless cooperative communication network where the source and relays have contradictory optimization goals and make decisions in a distributed manner. This differs from most existing works that have typically assumed that source and relay nodes follow a schedule created implicitly by a...
Article
Web 3.0 introduces the concept of crypto-network entities, which are independently defined by public key pairs and connected to Web 3.0 cyberspace. In this paper, we present a spacetime coordinate system that is based on fractal polytopes in any dimension, utilizing blockchain technology for discrete time and consensus. Furthermore, we define novel...
Article
Blockchain, with its immutability and decentralization, drives innovation in finance and supply chain, but the growing data volume makes storing complete ledger replicas impractical for users, especially in the resource-constrained Internet of Thing (IoT) scenarios. Existing solutions focus on nodes storing only a partial ledger to alleviate storag...
Preprint
Full-text available
World Wide Web is speeding up its pace into an intelligent and decentralized ecosystem, as seen in the campaign of Web 3.0 and forthcoming Web 4.0. Marked by the Europe Commission's latest mention of Web 4.0, a race towards strategic Web 4.0 success has started. Web 4.0 is committed to bringing the next technological transition with an open, secure...
Article
Full-text available
Owing to the attractive properties of decentralization, unforgeability, transparency, and traceability, blockchain is increasingly being used in various scenarios such as supply chain and public services, where massive Spatial-Temporal-Keywords (STK) transactions need to be packaged to the blockchain systems. However, due to the multi-dimensionalit...
Preprint
Full-text available
Web3 brings an emerging outlook for the value of decentralization, boosting the decentralized infrastructure. People can benefit from Web3, facilitated by the advances in distributed ledger technology, to read, write and own web content, services and applications more freely without revealing their real identities. Although the features and merits...
Preprint
Full-text available
Radio Access Network faces challenges from privacy and flexible wide area and local area network access. RAN is limited from providing local service directly due to centralized design of cellular network and concerns of user privacy and data security. DecentRAN or Decentralized Radio Access Network offers an alternative perspective to cope with the...
Article
Full-text available
The rapid development of the blockchain leads to a blowout of on-chain transactions, contracts, and currencies, which will further accelerate the increase of data. The existing blockchain systems typically support exact transaction queries, which, however, cannot satisfy the QoS requirements with intelligent adjustment in the blockchain systems. To...
Article
Full-text available
Recent data leak scandals, together with the under-utilization of collected data (estimated that around 90% of data never leaves a device's local storage), limits the applicability and potential of novel data driven applications. Thus, novel ways to treat data, in which users are guaranteed control, usability, and privacy over their generated data,...
Article
Full-text available
Since the coronavirus disease 19 (COVID-19) outbreak, the epidemiological analysis has raised a strong requirement for more effective and accurate contact tracing solution. However, the existing contact tracing solutions either lacked the evaluation of tracing proximity or the features used for the tracing proximity evaluation were susceptible to c...
Preprint
Metaverse depicts a vista of constructing a virtual environment parallel to the real world so people can communicate with others and objects through digital entities. In the real world, communication relies on identities and addresses that are recognized by authorities, no matter the link is established via post, email, mobile phone, or landline. M...
Article
Connected critical autonomous systems (C-CAS) are envisioned to significantly change our life and work styles through emerging vertical applications such as autonomous vehicles and cooperative robots. However, as the scale of the connected nodes continues to grow, their heterogeneity and cyber-security threats are more eminent, and conventional cen...
Article
Blockchain is built on a peer-to-peer network that relies on frequent communications among distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determine blockchain security bounds (i.e., fault tolerances) and other key performance metr...
Article
Full-text available
Blockchain is built on a peer-to-peer network that relies on frequent communications among the distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determines blockchain security bound and other key performance metrics such as transacti...
Conference Paper
Full-text available
The design of sharding aims to solve the scalability challenge in a blockchain network. Typically, by splitting the whole blockchain network into smaller shards, the transaction throughput can be significantly improved. However, distributing fewer attesting nodes for transactions in a shard may cause higher security risks. This paper analyzes the s...
Conference Paper
Full-text available
Given the heavy economic losses and threats to human health caused by COVID-19 worldwide, as well as the privacy concerns from existing contact tracing technologies, we developed a novel contact tracing mobile application BeepTrace based on blockchain, targeted at mitigating the pandemic and easing the privacy concerns of contact tracing. The app f...
Chapter
In light of the fast-spreading number of COVID-19 cases worldwide, contact tracing has been proven as an effective measure to slow down the infection rate and mitigate the casualities caused by this virus. However, due to several concerns in terms of privacy, as well as security, several countries and their population around the globe are reluctant...
Preprint
As 6G networks evolve towards a synergistic system of Communication, Sensing, and Computing, Radio Access Networks become more distributed, necessitating robust end-to-end authentication. We propose Blockchain-enabled Radio Access Networks, a novel decentralized RAN architecture enhancing security, privacy, and efficiency in authentication processe...
Preprint
Full-text available
Blockchain is built on a peer-to-peer network that relies on frequent communications among the distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determines blockchain security bound and other key performance metrics such as transacti...
Chapter
The sixth-generation (6G) network must provide performance superior to previous generations to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, even higher reliability, sub 1 millisecond latency and ubiquitous connection for the Internet of Everything (IoE). However, with the scarcity of spectrum...
Article
Full-text available
Practical Byzantine Fault Tolerance (PBFT) consensus mechanism shows a great potential to break the performance bottleneck of the Proof-of-Work (PoW) based blockchain systems, which typically support only dozens of transactions per second and require minutes to hours for transaction confirmation. However, due to frequent inter-node communications,...
Article
The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due to the nature of contact tracing, public concern on privacy issues has been a bottleneck to the existing solutions, which is significantly affecting the...
Article
Full-text available
Achieving ubiquitous ultra-reliable low latency consensus in centralized wireless communication systems can be costly and hard to scale up. The consensus mechanism, which has been widely utilized in distributed systems, can provide fault tolerance to the critical consensus, even though the individual communication link reliability is relatively low...
Article
Full-text available
Due to the number of confirmed cases and casualties of the new COVID-19 virus diminishing day after day, several countries around the world are discussing how to return to the new normal way of life. In order to keep the spread of the disease under control and avoid a second wave of infection, one alternative being considered is the utilization of...
Preprint
Full-text available
The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due to the nature of contact tracing, public concern on privacy issues has been a bottleneck to the existing solutions, which is significantly affecting the...
Preprint
Full-text available
The sixth generation (6G) network must provide performance superior to previous generations in order to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, even higher reliability, sub 1 millisecond latency and ubiquitous connection for Internet of Everything. However, with the scarcity of spectrum...
Article
Full-text available
The sixth generation (6G) network must provide performance superior to previous generations in order to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, even higher reliability, sub 1 millisecond latency and ubiquitous connection for Internet of Everything. However, with the scarcity of spectrum...
Article
Full-text available
Blockchain shows great potential to be applied in wireless IoT ecosystems for establishing the trust and consensus mechanisms without central authority's involvement. Based on RAFT consensus mechanism, this paper investigates the security performance of wireless blockchain networks in the presence of malicious jamming. We first map and model the bl...
Poster
Full-text available
Blockchain shows great potential to be applied in Internet-of-Things (IoT) ecosystems for establishing trust and consensus mechanisms without any third party involvement. Based on Raft consensus mechanism, this paper investigates the security performance of wireless blockchain networks in the presence of malicious jamming. We first map and model th...
Thesis
Full-text available
The Geofencing system is the key to operate the Unmanned Aerial Vehicle (UAV) within the safe and appropriate zone to avoid public concerns and other privacy issues. The system is designed to keep the UAV away from geofenced obstacles using the onboard GNSS and IMU location. The Geofencing system is part of the H2020 GAUSS project and facilities ot...
Thesis
Full-text available
The commercial airliner aircraft has seen dramatic changes in recent decades, from the first data bus to the latest Integrated Modular Avionics. Avionics has seen more advancement than any other parts of the aircraft, which did not have any major breakthrough regarding how we operate and fly the aircraft. Avionics, however, is evolutionary in past...
Thesis
Full-text available
This paper aims to develop a radio navigation system for an airborne vehicle to obtain vehicle’s direction (heading) and speed. It uses the Very High Frequency Omnidirectional Ranging (VOR) principle to determine the bearing of the vehicle and obtain its speed by analysing Doppler frequency shift of the signal. The approach uses Software Defined Ra...

Questions

Question (1)
Question
Hardware can be assessed using MTBF, and a Fault Tolerance Tree can be used to demonstrate the failure mode. However, for software, what is the more precise understanding of reliability except for the Assurance Level criteria?

Network

Cited By