Special lssues
Table of Content

Trustworthy Wireless Computing Power Networks Assisted by Blockchain

Submission Deadline: 30 June 2024 Submit to Special Issue

Guest Editors

Prof. Yin Zhang, University of Electronic Science and Technology of China, China
Prof. Wen Sun, Northwestern Polytechnical University, China
Prof. Limei Peng, Kyungpook National University, South Korea

Summary

In an increasingly connected world, the role of wireless computing power networks (WCPN) is becoming ever more critical, and it is fundamental to the Internet of Things (IoT), smart cities, and ubiquitous computing. Obviously, WCPN demands robust security protocols and trust mechanisms to ensure the reliability and integrity of transmitted data. The blockchain technology offers a groundbreaking approach to guarantee the trustworthiness and security of these networks. This special issue is dedicated to the exploration of blockchain's potential in creating decentralized, transparent, and tamper-resistant systems that can govern WCPN with unparalleled efficiency.

 

This special issue invites pioneering research focusing on how to implement blockchain to enable secure wireless communication, safeguard against cyber threats, and provide a trustworthy computing power sharing mechanism. Expected contributions may involve theoretical models, algorithmic innovations, empirical studies, and real-world applications that demonstrate how blockchain can enhance the resilience and efficiency of WCPN. Topics of interest include but are not limited to: decentralized network management, consensus algorithms for resource allocation, cryptographic protocols for enhanced security, and blockchain-based solutions for privacy preservation in WCPN.

 

This issue seeks to offer comprehensive insights into the design, analysis, and implementation of blockchain-assisted WCPN that are robust against vulnerabilities and capable of supporting the ever-growing demand for wireless services.


Keywords

Blockchain Technology
Wireless Networks
Computing Power Networks
Trust and Security
Internet of Things (IoT)
Ubiquitous Computing
Data Integrity
Privacy Preservation
Network Optimization
Decentralized Systems

Share Link