scispace - formally typeset
Search or ask a question
Author

Kun Wang

Bio: Kun Wang is an academic researcher from University of California, Los Angeles. The author has contributed to research in topics: Big data & Smart grid. The author has an hindex of 40, co-authored 295 publications receiving 5686 citations. Previous affiliations of Kun Wang include University of California, Berkeley & Nanjing University of Posts and Telecommunications.


Papers
More filters
Journal ArticleDOI
TL;DR: This article adopts an energy-efficient architecture for Industrial IoT, which consists of a sense entities domain, RESTful service hosted networks, a cloud server, and user applications, and a sleep scheduling and wake-up protocol, supporting the prediction of sleep intervals.
Abstract: The Internet of Things (IoT) can support collaboration and communication between objects automatically. However, with the increasing number of involved devices, IoT systems may consume substantial amounts of energy. Thus, the relevant energy efficiency issues have recently been attracting much attention from both academia and industry. In this article we adopt an energy-efficient architecture for Industrial IoT (IIoT), which consists of a sense entities domain, RESTful service hosted networks, a cloud server, and user applications. Under this architecture, we focus on the sense entities domain where huge amounts of energy are consumed by a tremendous number of nodes. The proposed framework includes three layers: the sense layer, the gateway layer, and the control layer. This hierarchical framework balances the traffic load and enables a longer lifetime of the whole system. Based on this deployment, a sleep scheduling and wake-up protocol is designed, supporting the prediction of sleep intervals. The shifts of states support the use of the entire system resources in an energy-efficient way. Simulation results demonstrate the significant advantages of our proposed architecture in resource utilization and energy consumption.

361 citations

Journal ArticleDOI
TL;DR: An introduction and the motivation to the evolution from smart grid to EI are presented and a representative EI architecture is introduced, i.e., the future renewable electric energy delivery and management system.
Abstract: Energy crisis and carbon emission have become two seriously concerned issues universally. As a feasible solution, Energy Internet (EI) has aroused global concern once proposed. EI is a new power generation developing a vision of evolution of smart grids into the Internet. The communication infrastructure is an essential component to the implementation of EI. A scalable and permanent communication infrastructure is crucial in both construction and operation of EI. In this paper, we present an introduction and the motivation to the evolution from smart grid to EI. We also introduce a representative EI architecture, i.e., the future renewable electric energy delivery and management system. Four critical EI features are emphasized. Then, we summarize the essential requirements that EI systems have to meet. With several key supporting technologies, EI shall realize the optimal utilization of highly scalable and distributed green energy resources, so that the situation of severe energy source crisis and carbon emission can be efficiently relieved. Since an EI system might have extensively distributed consumers and devices, the guarantee of its reliability and security is extremely significant. The further specific exploration for challenges, including reliability and security, will be stated in this paper.

307 citations

Journal ArticleDOI
TL;DR: This survey unroll and structure the blockchain related discoveries and scientific results in many aspects and classify blockchain technologies into four layers and carries out a comprehensive study on the consensus strategies, the network, and the applications of blockchain.
Abstract: As an innovated and revolutionized technology, blockchain has been applied in many fields, such as cryptocurrency, food traceability, identity management, or even market prediction. To discover its great potential, both industry and academia have paid great attention to it and numerous researches have been conducted. Based on the literature and industry whitepapers, in this survey, we unroll and structure the blockchain related discoveries and scientific results in many aspects. Particularly, we classify blockchain technologies into four layers and carry out a comprehensive study on the consensus strategies, the network, and the applications of blockchain. Different blockchain applications are put into the corresponding categories based on the fields, especially in Internet of Things (IoT). When introducing each layer, we not only organize and summarize the related works, but also discuss the fundamental issues and future research directions. We hope this survey could shed some light on the research of blockchain and serve as a guide for further studies.

210 citations

Journal ArticleDOI
TL;DR: A blockchain-based big data sharing framework to support various applications across resource-limited edges by exploiting blockchain’s non-repudiation and non-tampering properties that enable trust is developed.
Abstract: The emergence of edge computing has witnessed a fast-growing volume of data on edge devices belonging to different stakeholders which, however, cannot be shared among them due to the lack of the trust By exploiting blockchain’s non-repudiation and non-tampering properties that enable trust, we develop a blockchain-based big data sharing framework to support various applications across resource-limited edges In particular, we devise a number of novel resource-efficient techniques for the framework: (1) the PoC (Proof-of-Collaboration) based consensus mechanism with low computation complexity which is especially beneficial to the edge devices with low computation capacity, (2) the blockchain transaction filtering and offloading scheme that can significantly reduce the storage overhead, and (3) new types of blockchain transaction (ie, Express Transaction) and block (ie, Hollow Block) to enhance the communication efficiency Extensive experiments are conducted and the results demonstrate the superior performance of our proposal

199 citations

Journal ArticleDOI
TL;DR: This paper gives a brief introduction on big data, smart grid, and big data application in the smart grid scenario, and recent studies and developments are summarized in the context of integrated architecture and key enabling technologies.
Abstract: As a significant application of energy, smart grid is a complicated interconnected power grid that involves sensors, deployment strategies, smart meters, and real-time data processing. It continuously generates data with large volume, high velocity, and diverse variety. In this paper, we first give a brief introduction on big data, smart grid, and big data application in the smart grid scenario. Then, recent studies and developments are summarized in the context of integrated architecture and key enabling technologies. Meanwhile, security issues are specifically addressed. Finally, we introduce several typical big data applications and point out future challenges in the energy domain.

177 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper presents a comprehensive literature review on applications of deep reinforcement learning (DRL) in communications and networking, and presents applications of DRL for traffic routing, resource sharing, and data collection.
Abstract: This paper presents a comprehensive literature review on applications of deep reinforcement learning (DRL) in communications and networking. Modern networks, e.g., Internet of Things (IoT) and unmanned aerial vehicle (UAV) networks, become more decentralized and autonomous. In such networks, network entities need to make decisions locally to maximize the network performance under uncertainty of network environment. Reinforcement learning has been efficiently used to enable the network entities to obtain the optimal policy including, e.g., decisions or actions, given their states when the state and action spaces are small. However, in complex and large-scale networks, the state and action spaces are usually large, and the reinforcement learning may not be able to find the optimal policy in reasonable time. Therefore, DRL, a combination of reinforcement learning with deep learning, has been developed to overcome the shortcomings. In this survey, we first give a tutorial of DRL from fundamental concepts to advanced models. Then, we review DRL approaches proposed to address emerging issues in communications and networking. The issues include dynamic network access, data rate control, wireless caching, data offloading, network security, and connectivity preservation which are all important to next generation networks, such as 5G and beyond. Furthermore, we present applications of DRL for traffic routing, resource sharing, and data collection. Finally, we highlight important challenges, open issues, and future research directions of applying DRL.

1,153 citations

Journal ArticleDOI
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Abstract: Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.

1,060 citations