- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Cryptography and Data Security
- Software-Defined Networks and 5G
- Caching and Content Delivery
- Biometric Identification and Security
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Risk Management in Financial Firms
- Advanced Computational Techniques and Applications
- Privacy-Preserving Technologies in Data
- User Authentication and Security Systems
- Advanced Photonic Communication Systems
- Advanced Optical Network Technologies
- Data Mining Algorithms and Applications
- Digital Rights Management and Security
- Wireless Communication Security Techniques
- Web Data Mining and Analysis
- Advanced Data and IoT Technologies
- Age of Information Optimization
- Cognitive Radio Networks and Spectrum Sensing
InterDigital (United States)
2014-2024
Northwestern Polytechnical University
2019
Dalian Polytechnic University
2013
Dalian University
2012
Spectrum access system (SAS) is widely considered the de facto solution to coordinating dynamic spectrum sharing (DSS) and protecting incumbent users. The current SAS paradigm prescribed by FCC for CBRS band standardized WInnForum follows a centralized service model in that user subscribes server allocation service. This model, however, neither tolerates failures (crash or Byzantine) nor resists dishonest administrators, leading serious concerns about reliability trustworthiness. especially...
Many emerging wireless applications are based on unique requirements such as edge data processing, distributed trust, and automation, which can be provided enabled by blockchain technology through decentralization, transaction accountability, smart contract-based automation. This article discusses opportunities challenges of blockchain-enabled applications. First, 5G system architecture briefly reviewed. Then, an example application use case is presented to illustrate the benefits that bring...
The spectrum access system (SAS) is being deployed as a key component of the emerging sharing paradigm to address crunch facing U.S. wireless industry. Ensuring security and privacy this against potential attacks task paramount importance. In article, we first introduce SAS system, describing its three-tier model, functional architecture, management protocol. We then provide comprehensive analysis variety that an vulnerable to, discuss their countermeasures. identify challenges, formalize...
Spectrum access system (SAS) is widely considered the de facto solution to coordinating dynamic spectrum sharing (DSS) and protecting incumbent users. The current SAS paradigm prescribed by FCC for CBRS band standardized WInnForum follows a centralized service model in that user subscribes server allocation service. This model, however, neither tolerates failures (crash or Byzantine) nor resists dishonest administrators, leading serious concerns on reliability trustworthiness. especially...
Blockchain and distributed ledger technology started as a decentralized infrastructure to enable manage digital currency like Bitcoin without relying on central authority. One of the attractive features provided by blockchain is its append-only “immutability” feature, which means stored data cannot be modified or manipulated any once it validated in ledger. Such immutability helps traceability, auditing, non-repudiation, builds trust among un-trusted parties. Despite that, if misused could...
The spectrum access system (SAS) designated by the FCC follows a centralized server-client model where user registers with one SAS service provider for allocation and other management functions. This model, however, is vulnerable to adversarial influence on individual servers, causing concerns over reliability trustworthiness, especially when ecosystem embraces growing base of providers heterogeneous requirements. In this paper, we propose blockchain-based decentralized architecture called...
Recent advances in Blockchain-based Federated Learning (FL) aim to address the inherent limitations of traditional FL, such as single node failure and lack an appropriate incentive mechanism. This approach replaces central parameter server FL with a blockchain that stores disseminates updated models. However, its decentralized nature introduces significant communication storage over-head, which considerably constrains practical application. Additionally, it allows participants contribute...
Blockchain is widely adopted in many applications as a promising distributed data management framework. However, the high demanding on computing and communication resources may pose bottleneck for blockchain to be applied wireless connected users, which are assumed main constituent part future digital society. In this paper, order solve problems of insufficient faced "Mining" process, we consider system based mobile edge (MEC) network. The computation-intensive tasks users offloaded MEC...
Distributed ledger technology, with its multitude of advantages including immutability, transparency, decentralization, and security, has excellent potential to promote even revolutionize future 6G mobile networks. Large-scale distributed deployment within or for networks relies on ledger-focused standards facilitate ensure interoperability. The European Telecommunications Standards (ETSI) Industry Specification Group (ISG) Permissioned Ledger (PDL) develops PDL-related standards, targeting...
By adopting the basic idea of role-based access control, RBAC permissions management thinking integrated into design and development graduate system. Add role object between users in User obtains operating authority by grant permission to mapping roles. It decouples relationship permissions. Realized RBAC-based system rights control functions. Rights is more convenient security improved.
Space induced rice mutant research focus on the various effects which caused by space environment gene. To express, describe and manage large number of data with diverse formats, that are generated field experiments a series genomic proteomic molecular biology experiments, database technology is used for modeling in this paper. The implemented system applied able to organize, analyze effectively. analysis results obtain meaningful data, guide further lay foundation subsequent mining.
The conventional device authentication of wireless networks usually relies on a security server and centralized process, leading to long latency risk single-point failure. While these challenges might be mitigated by collaborative schemes, their performance remains limited the rigidity data collection aggregated result. They also tend ignore attacker localization in process. To overcome challenges, novel scheme is proposed, where multiple edge devices act as cooperative peers assist service...