- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Privacy-Preserving Technologies in Data
- Network Security and Intrusion Detection
- Technology and Security Systems
- Distributed systems and fault tolerance
- Smart Grid and Power Systems
- COVID-19 Digital Contact Tracing
- Mobile Ad Hoc Networks
- Privacy, Security, and Data Protection
- Advanced Wireless Communication Technologies
- Peer-to-Peer Network Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Anomaly Detection Techniques and Applications
- Smart Grid Security and Resilience
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Data Security
- Software-Defined Networks and 5G
- Power Systems and Renewable Energy
- Age of Information Optimization
- Access Control and Trust
- Cloud Data Security Solutions
- Security and Verification in Computing
- Caching and Content Delivery
State Grid Corporation of China (China)
2019-2025
University of Nevada, Reno
2016-2024
University of Glasgow
2020-2024
Tongji University
2024
Huawei Technologies (United Kingdom)
2022-2023
China Three Gorges University
2014-2021
Beijing Institute of Technology
2019-2020
Sichuan University
2020
Philadelphia University
2014
University of Pennsylvania
2014
Practical Byzantine Fault Tolerance (PBFT) consensus mechanism shows a great potential to break the performance bottleneck of Proof-of-Work (PoW)-based blockchain systems, which typically support only dozens transactions per second and require minutes hours for transaction confirmation. However, due frequent inter-node communications, PBFT has poor node scalability thus it is adopted in small networks. To enable large systems such as massive Internet Things (IoT) ecosystems blockchain, this...
The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due nature tracing, public concern on privacy issues been a bottleneck existing solutions, which is significantly affecting uptake across globe. In this paper, we present blockchain-enabled privacy-preserving scheme: BeepTrace, where propose adopt blockchain bridging user/patient and authorized solvers...
The sixth-generation (6G) network must provide better performance than previous generations to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, higher reliability, sub-1 ms latency ubiquitous connection for Internet Everything (IoE). However, with scarcity spectrum resources, efficient resource management sharing are crucial achieving all these ambitious requirements. One possible technology achieve this is blockchain. Because its...
Blockchain shows great potential to be applied in wireless IoT ecosystems for establishing the trust and consensus mechanisms without central authority's involvement. Based on RAFT mechanism, this letter investigates security performance of blockchain networks presence malicious jamming. We first map model transaction as a network composed uplink downlink transmissions by assuming follower nodes' position Poisson Point Process (PPP) with selected leader location. The probability achieving...
Blockchain is built on a peer-to-peer network that relies frequent communications among distributively located nodes. In particular, the consensus mechanisms (CMs), which play pivotal role in blockchain, are communication resource-demanding and largely determine blockchain security bounds (i.e., fault tolerances) other key performance metrics such as transaction throughput, latency scalability. Most systems designed stable wired running advanced devices under assumption of sufficient...
Metaverse depicts a vista of constructing virtual environment parallel to the real world so people can communicate with others and objects through digital entities. In world, communication relies on identities addresses that are recognized by authorities, no matter link is established via post, email, mobile phone, or landline. Metaverse, however, different from which requires single identity belongs individual. This be an encrypted address in metaverse but one trace verify it. order achieve...
Due to the number of confirmed cases and casualties new COVID-19 virus diminishing day after day, several countries around world are discussing how return normal way life. In order keep spread disease under control avoid a second wave infection, one alternative being considered is utilization contact tracing. However, despite alternatives available, tracing still faces issues in terms maintaining user privacy security, making its mass adoption quite difficult. Based on that, novel framework...
Achieving ubiquitous ultra-reliable low latency consensus in centralized wireless communication systems can be costly and hard to scale up. The mechanism, which has been widely utilized distributed systems, provide fault tolerance the critical consensus, even though individual link reliability is relatively low. In this article, a used Raft, introduced Industrial Internet of Things (IIoT) achieve where performance terms nodes number transmission investigated. We propose new concept,...
Web3 brings an emerging outlook for the value of decentralization, boosting decentralized infrastructure. People can benefit from Web3, facilitated by advances in distributed ledger technology, to read, write and own web content, services applications more freely without revealing their real identities. Although features merits have been widely discussed, network architecture how achieve complete decentralization considering law compliance are still unclear. Here, we propose a perspective...
The increasing integration of renewable energy sources (RESs) introduces significant uncertainties in both generation and demand, presenting critical challenges to the convergence, feasibility, real-time performance optimal power flow (OPF). To address these challenges, a multi-agent deep reinforcement learning (DRL) model is proposed solve OPF while ensuring constraints are satisfied rapidly. A heterogeneous proximal policy optimization (H-MAPPO) DRL algorithm introduced for multi-area...
As 6G networks evolve towards a synergistic system of Communication, Sensing, and Computing, Radio Access Networks become more distributed, necessitating robust end-to-end authentication. We propose Blockchain-enabled Networks, novel decentralized RAN architecture enhancing security, privacy, efficiency in authentication processes. BE-RAN leverages distributed ledger technology to establish trust, offering user-centric identity management, enabling mutual authentication, facilitating...
With the popular use of IoT devices, edge computing has been widely applied in Internet things (IoT) and regarded as a promising solution for its wide distribution, decentralization, low latency. At same time, response to massive data intelligent requirements various applications IoT, artificial intelligence (AI) technology also achieved rapid development. As result, (EI) Things attracted widespread attention. Driven by requirement that making full data, machine learning (ML) models trained...
Connected critical autonomous systems (C-CASs) are envisioned to significantly change our life and work styles through emerging vertical applications, such as vehicles cooperative robots. However, the scale of connected nodes continues grow, their heterogeneity cybersecurity threats more eminent, conventional centralized communications decision-making methodology reaching limit. This article is first exploration a trustworthy fault-tolerant framework for C-CAS achieving hyperreliable global...
In this paper, the security problem for mobile satellite communication networks (MSNET) has been investigated. With rapidly growth of needs, systems represent a significant solution to provide high-quality services users in under-populated regions, emergency areas, on planes, trains and ships. However, lacking an effective framework secure seriously limited practicality services. Therefore, new have developed paper address challenges network. Firstly, formulated as delay-tolerance network...
Recent data leak scandals, together with the under-utilization of collected (estimated that around 90% never leaves a device’s local storage), limits applicability and potential novel driven applications. Thus, ways to treat data, in which users are guaranteed control, usability, privacy over their generated needed. In this paper we propose privacy-preserving blockchain framework for sharing marketplace. The proposed allows (such as sensors devices) generate store it external servers, while...
Due to the explosion of mobile users and ever-increasing heterogeneity scale wireless networks, traditional communication protocols optimizing methods can not satisfy future network (FWN) requirements. As promising technologies, artificial intelligence (AI) blockchain are deemed as solution for FWN. AI, famous its big data processing ability, will enable FWN self-update itself better adapt dynamic condition. Blockchain, a distributed ledger, guarantee integrity, security, privacy. In this...
Most of flooding algorithm recent Ad Hoc multicast routing protocols are suitable under specific networks conditions. If the condition changes like increasing number source nodes and or having higher node speed more traffic loads, they will not work well. To provide support for a wide range operational condition, we propose new protocol (CBSRP) that integrates effectiveness scheme efficiency mesh scheme. The constructs metric stability selects stable path with help entropy to reduce route...
The design of sharding aims to solve the scalability challenge in a blockchain network. Typically, by splitting whole network into smaller shards, transaction throughput can be significantly improved. However, distributing fewer attesting nodes for transactions shard may cause higher security risks. This paper analyzes level verification different types shards and transactions. analyzed result indicates that size validating number influence shards. And random distribution reduce such improve...
Future data communication networks show three emerging trends: increasing size of networks, traffic volumes and dynamic network topologies. Efficient management solutions are required that scalable, can cope with large, increasing, provide decentralised adaptive routing strategies the dynamics topology. Routing an important aspect as they have a significant influence on overall performance. This paper introduces preliminary studies for FUNNet, new algorithm inspired by kingdom Fungi. Fungi...
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such Secure BGP (S-BGP). In this paper, we develop a sound program logic for SANDLog-a declarative specification language protocols verifying properties these protocols. We prove invariant SANDLog programs that run in an adversarial environment. As step towards automated verification, implement...
Since the coronavirus disease 19 (COVID-19) outbreak, epidemiological analysis has raised a strong requirement for more effective and accurate contact tracing solution. However, existing solutions either lacked evaluation of proximity or features used were susceptible to certain negative environmental factors (e.g., body shielding). In this article, we propose novel distance estimation algorithm based on machine learning tracing: DISTERNING, where leverage algorithms including Learning...
Blockchain has the potential to reform architecture of cyberspace and transform storage, circulation exchange information through decentralization, transparency de-identification. Meaning that ordinary participants can become traders, miners, retailers, customers simultaneously, breaking barriers reducing gap between in community, contributing futuristic metaverse with an open progressive equal ideology. Such transformation empowered by blockchain also profoundly impacts our methodological...