2022
DOI: 10.23919/jcin.2022.10005213
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain for Network Slicing in 5G and Beyond: Survey and Challenges

Abstract: Network slicing has gained popularity as a result of the advances in the fifth generation (5G) mobile network. Network slicing facilitates the support of different service types with varying requirements, which brings into light the slicing-aware next generation mobile network architecture. While allowing resource sharing among multiple stakeholders, there is a long list of administrative negotiations among parties that have not established mutual trust. Distributed ledger technology may be a solution to mitig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 53 publications
0
1
0
Order By: Relevance
“…Similarly, vulnerabilities in the application programming interface (API) used during configuration can enable malicious actors to interfere with slice installation, configuration, or activation. Thus, ensuring the confidentiality of inter-slice communications is crucial for establishing a secure environment [39][40] [41]. Proactive measures like implementing secure communication protocols, enforcing access controls, and conducting regular security policy reviews are necessary to mitigate these threats effectively.…”
Section: B More Security Challenges To Network Slicingmentioning
confidence: 99%
“…Similarly, vulnerabilities in the application programming interface (API) used during configuration can enable malicious actors to interfere with slice installation, configuration, or activation. Thus, ensuring the confidentiality of inter-slice communications is crucial for establishing a secure environment [39][40] [41]. Proactive measures like implementing secure communication protocols, enforcing access controls, and conducting regular security policy reviews are necessary to mitigate these threats effectively.…”
Section: B More Security Challenges To Network Slicingmentioning
confidence: 99%