2020 IEEE 3rd 5G World Forum (5GWF) 2020
DOI: 10.1109/5gwf49715.2020.9221075
|View full text |Cite
|
Sign up to set email alerts
|

B-VNF: Blockchain-enhanced Architecture for VNF Orchestration in MEC-5G Networks

Abstract: The roll-out of 5G technology will nurture the realization of broadband, ultra-reliable, and zero latency services. Network Function Virtualization (NFV) and Multi-Access Edge Computing (MEC) are among the key enablers for 5G. The synergy between NFV and MEC allows migration of Virtual Network Functions (VNF) from cloud to the edge of the network thereby adding agility to the softwarized 5G networks. The overall orchestration of VNF includes, but is not limited to, processing VNF requests, selecting appropriat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…For this work, cost is not the primary concern. Still, VeNiCE requires less gas (total of 257 924) to deploy a VNF than related work, such as [23], which requires 1 818 026 gas for its contract execution. The prototype was implemented to show the technical feasibility of implementing such a system for VNF deployment and life-cycle management.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For this work, cost is not the primary concern. Still, VeNiCE requires less gas (total of 257 924) to deploy a VNF than related work, such as [23], which requires 1 818 026 gas for its contract execution. The prototype was implemented to show the technical feasibility of implementing such a system for VNF deployment and life-cycle management.…”
Section: Discussionmentioning
confidence: 99%
“…In another approach, B-VNF [23] proposes a BC-based orchestration architecture for 5G networks. [36] similarly utilizes BCs for orchestration.…”
Section: Related Workmentioning
confidence: 99%
“…8 However, the dynamic nature of VNFs and their distribution across edge devices increase the attack surface and potential vulnerabilities. 9 One of the critical challenges in VNF-based IoT MEC systems is the prompt detection and revocation of unauthorized access. Unauthorized access to VNF-based IoT MEC systems can lead to data breaches, privacy violations, and service disruptions.…”
Section: Introductionmentioning
confidence: 99%
“…They facilitate dynamic deployment and management of functions like routing, security, and traffic optimization, optimizing resource allocation based on IoT device and application demands at the network edge 8 . However, the dynamic nature of VNFs and their distribution across edge devices increase the attack surface and potential vulnerabilities 9 …”
Section: Introductionmentioning
confidence: 99%
“…The non-hierarchical architecture proposed in the paper revolutionizes the management of Network Slicing requests, offering several advantages over traditional hierarchical models. (Mishra et al, 2020) have developed and tested a Proof of Concept (PoC) called "BVNF" focusing on the security of VNF orchestration and their migration to the MEC. The system manages the announcement of a network virtualisation function as well as the validation of a VNF request by a MEC based on the latter's reputation.…”
Section: Introductionmentioning
confidence: 99%