2018 International Conference on Computing, Networking and Communications (ICNC) 2018
DOI: 10.1109/iccnc.2018.8390344
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Distributed Blockchain-based Scheme for Wireless Network Virtualization with Security and QoS Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(25 citation statements)
references
References 22 publications
0
23
0
2
Order By: Relevance
“…Network virtualization: Wireless network virtualization increases the capacity and energy efficiency of networks, providing for the growing needs of IoT data. Blockchain can help in non-repudiation and immutability in the management of virtual network slices [22].…”
Section: G To 6g: Evolution Of Security and Privacymentioning
confidence: 99%
“…Network virtualization: Wireless network virtualization increases the capacity and energy efficiency of networks, providing for the growing needs of IoT data. Blockchain can help in non-repudiation and immutability in the management of virtual network slices [22].…”
Section: G To 6g: Evolution Of Security and Privacymentioning
confidence: 99%
“…The work in [55] leverages distributed Blockchain to create a virtual wireless network (similar to network slice) on the fly by leasing the resources from the primary owner. The resources that are leased can be either RF spectrum or infrastructure based on the service level agreements stored in the smart contract.…”
Section: ) Network Slicingmentioning
confidence: 99%
“…Diversos trabalhos exploram o estado da arte de corrente de blocos aplicada a problemas de redes de comunicação e redes de quinta geração (5G) [Yahiatene and Rachedi 2018, Ortega et al 2018, Thuemmler et al 2018, Capossele et al 2018, Rawat and Alshaikhi 2018, Rosa and Rothenberg 2018, Boudguiga et al 2017. Os trabalhos se concentram no uso de corrente de blocos como um repositório de dados incrementais replicados, no qual todas as transações realizadas são assinadas e registradas com criptografia de chaves assimétricas.…”
Section: Trabalhos Relacionadosunclassified
“…Os resultados do artigo mostram que a corrente de blocos fornece a privacidade e proteção de dados necessários para proteger registros médicos em um ambiente sem confiança. Rawat et al propõem uma solução baseada em corrente de blocos para redes sem fio virtuais que permite a confiança em provedores de nuvem [Rawat and Alshaikhi 2018]. Rosa e Rothemberg fornecem diretrizes para incorporar os aplicativos distribuídos baseados em corrente de blocos em cenários com múltiplos domínios administrativos [Rosa and Rothenberg 2018].…”
Section: Trabalhos Relacionadosunclassified