IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2019
DOI: 10.1109/infocom.2019.8737487
|View full text |Cite
|
Sign up to set email alerts
|

Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Blockchain networks have been widely adapted for cybersecurity of the Internet of Things (IoT) [6], Internet of Vehicles (IoV) [7] and Edge-Fog computing [8]. The companies and groups such as IOTA 1 , Dfinity 2 , Ethereum 3 , Lightening Group 4 and NEO 5 are working working on blockchain 3.0 projects [9]. There are two types of BCNs, namely permissionless and permissioned.…”
Section: Related Work and Contributions A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchain networks have been widely adapted for cybersecurity of the Internet of Things (IoT) [6], Internet of Vehicles (IoV) [7] and Edge-Fog computing [8]. The companies and groups such as IOTA 1 , Dfinity 2 , Ethereum 3 , Lightening Group 4 and NEO 5 are working working on blockchain 3.0 projects [9]. There are two types of BCNs, namely permissionless and permissioned.…”
Section: Related Work and Contributions A Related Workmentioning
confidence: 99%
“…allocated compute or storage resources), should be identifiable by those managing the services (e.g., MNOs) and those requesting the service (e.g., vertical SPs). Transparency should also be established between multiple entities to prevent some entities (e.g., CSPs or MNO) being dishonest and blaming others to avoid penalties when network service delivery failures occur (e.g., due to the malfunction of some network devices [4]).…”
Section: Introductionmentioning
confidence: 99%
“…From an accountability point of view, if a device malfunctions, network operators should be able to identify precisely the device which failed to meet its quality standards. Transparency, on the other hand, is essential because some dishonest vendors may try to hide their errors and blame others, to save themselves from having to pay a penalty [5].…”
Section: Introductionmentioning
confidence: 99%