Blockchain Based Multi-Domain Resource Allocation of Network Slicing

Document Type : Original Article

Authors

Department of Electrical and Computer Engineering, Malek Ashtar University of Technology, Tehran, Iran.

Abstract

In the fifth generation of mobile networks (5G), managing the high traffic volume of applications and the needs of active objects in this network requires a strong, isolated, and secure platform. This is achieved by using the new concept of network slicing. DBNS (a distributed approach based on blockchain) is a method of allocating resources in terms of network slices. Unfortunately, this method faces a security issue caused by the non-observance of data transparency. A smart As a result of the allocation of resources between providers, this article utilizes the smart contract feature of the blockchain to create data transparency, as well as a secure communication platform, in the context of network slicing and among different service providers (SPs), creating a service and even reducing the delay imposed on the network. In this paper, we present a smart DBNS approach that uses smart contracts and blockchains to make interactions between SPs more secure and smart. The simulation results of the proposed method show that on average, the service delivery delay is reduced by 18% and 5%, respectively, in the two parts of the uRLLC and mMTC networks, and it promotes a new approach in the integration of these two technologies.

Keywords

Main Subjects


[1] Afolabi, I., Taleb, T., Samdanis, K., Ksentini, A., & Flinck, H. (2018). Network slicing and softwarization: "A survey on principles, enabling technologies, and solutions." IEEE Communications Surveys & Tutorials, 20(3), 2429-2453.
[2] Zhang, H., Liu, N., Chu, X., Long, K., Aghvami, A. H., & Leung, V. C. (2017). Network slicing based 5G and future mobile networks: "mobility, resource management, and challenges." IEEE communications magazine, 55(8), 138-145.
[3] Ye, Qiang, and Weihua Zhuang. "Intelligent Resource Management for Network Slicing in 5G and Beyond."
[4] Rommer, S., Hedman, P., Olsson, M., Frid, L., Sultana, S., & Mulligan, C. (2019). "5G Core Networks: Powering Digitalization. Academic Press."
[5] Haber and W. S. Stornetta, "How to time-stamp a digital document," in Conference on the Theory and Application of Cryptography, 1990, pp. 437–455.
[6] Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," Manubot, 2019.
[7] Foukas, X., Patounas, G., Elmokashfi, A., & Marina, M. K. (2017). "Network slicing in 5G: Survey and challenges." IEEE Communications Magazine, 55(5), 94-100.
[8] Togou, M. A., Bi, T., Dev, K., McDonnell, K., Milenovic, A., Tewari, H., & Muntean, G. M. (2020). DBNS: "A Distributed Blockchain-Enabled Network Slicing Framework for 5G Networks." IEEE Communications Magazine, 58(11), 90-96.
[9] Morgan, J. P. (2016). "Quorum whitepaper."New York: JP Morgan Chase.
[10] He, Guobiao, Wei Su, Shuai Gao, Ningchun Liu, and Sajal K. Das. "NetChain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture." IEEE Transactions on Network and Service Management 19, no. 1 (2021): 188-202.
[11] Ssengonzi, C., Kogeda, O. P., & Olwal, T. O. (2022). A survey of deep reinforcement learning application in 5G and beyond network slicing and virtualization. Array, 100142.
[12] R. Sama, X. An, Q. Wei, and S. Beker, "Reshaping the mobile core network via function decomposition and network slicing for the 5G Era," in Proc. IEEE Wireless Commun. Netw. Conf., pp. 1-7, Apr. 2016.
[13] Cunha, V. A., da Silva, E., de Carvalho, M. B., Corujo, D., Barraca, J. P., Gomes, D., ... & Aguiar, R. L. (2019). "Network slicing security: Challenges and directions."Internet Technology Letters, 2(5), e125.
[14] Nour, B., Ksentini, A., Herbaut, N., Frangoudis, P. A., & Moungla, H. (2019). "A blockchain-based network slice broker for 5G services. " IEEE Networking Letters, 1(3), 99-102.
[15] Backman, J., Yrjölä, S., Valtanen, K., & Mämmelä, O. (2017, November). "Blockchain network slice broker in 5G: Slice leasing in factory of the future use case. " In 2017 Internet of Things Business Models, Users, and Networks (pp. 1-8). IEEE.
[16] Papageorgiou, A., Fernández-Fernández, A., Siddiqui, S., & Carrozzo, G. (2020). "On 5G network slice modelling: Service-, resource-, or deployment-driven?." Computer Communications, 149, 232-240.
[17] Faisal, Tooba, Mischa Dohler, Simone Mangiante, and Diego R. Lopez. "BEAT: Blockchain-Enabled Accountable and Transparent Network Sharing in 6G." IEEE Communications Magazine 60, no. 4 (2022): 52-56.
[18] Ssengonzi, C., Kogeda, O. P., & Olwal, T. O. (2022). A survey of deep reinforcement learning application in 5G and beyond network slicing and virtualization. Array, 100142.
[19] Hewa, Tharaka Mawanane, Ivana Kovacevic, Pawani Porambage, Nisita Weerasinghe, Madhusanka Liyanage, Erkki Harjula, and Mika Ylianttila. "Blockchain-based Network Slice Broker to Facilitate Factory-as-a-Service." IEEE Transactions on Industrial Informatics (2022).
[20] He, Yunhua, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, and Hong Li. "Cross-chain Trusted Service Quality Computing Scheme For Multi-chain Model-based 5G Network Slicing SLA." IEEE Internet of Things Journal (2021).
[21] صبا اسعد; امیر مسعود ربیعی. "الگوریتم جدید انتخاب آنتن در سیستم‌های چندورودی-چندخروجی کلان". مجله مهندسی برق دانشگاه تبریز, 50, 3, 1399, 1003-1010.
[22] رضا هنرور; علیرضا ذوالقدر اصلی. "تحلیل ارزیابی کارایی الگوریتم‌های انتخاب شبکه در شبکه‌های بی‌سیم ناهمگن نسل پنجم". مجله مهندسی برق دانشگاه تبریز, 50, 2, 1399, 963-975.
[23] Zeinali, V., & Khaleghi Bizaki, H. (2016). Shared secret key generation protocol in wireless networks based on the phase of MIMO fading channels. Wireless Personal Communications, 89, 1315-1334.