ArticlePDF Available

Abstract and Figures

5G technology is expected to enable many innovative applications in different verticals. These applications have heterogeneous performance requirements (e.g., high data rate, low latency, high reliability, and high availability). In order to meet these requirements, 5G networks endorse network flexibility through the deployment of new emerging technologies, mainly network slicing and mobile edge computing. This article introduces a distributed blockchain-enabled network slicing (DBNS) framework that enables service and resource providers to dynamically lease resources to ensure high performance for their end-to-end services. The key component of our framework is global service provisioning, which provides admission control for incoming service requests along with dynamic resource assignment by means of a blockchain-based bidding system. The goal is to improve users' experience with diverse services and reduce providers' capital and operational expenditure.
Content may be subject to copyright.
IEEE Communications Magazine • November 2020
20163-6804/20/$25.00 © 2020 IEEE
AbstrAct
5G technology is expected to enable many
innovative applications in different verticals. These
applications have heterogeneous performance
requirements (e.g., high data rate, low latency,
high reliability, and high availability). In order to
meet these requirements, 5G networks endorse
network flexibility through the deployment of new
emerging technologies, mainly network slicing
and mobile edge computing. This article introduc-
es a distributed blockchain-enabled network slic-
ing (DBNS) framework that enables service and
resource providers to dynamically lease resources
to ensure high performance for their end-to-end
services. The key component of our framework is
global service provisioning, which provides admis-
sion control for incoming service requests along
with dynamic resource assignment by means of
a blockchain-based bidding system. The goal is to
improve users’ experience with diverse services
and reduce providers’ capital and operational
expenditure.
IntroductIon
5G technology is expected to promote many new
applications in different vertical industries such
as manufacturing, automotive, healthcare, ener-
gy, and mobile broadband. Such applications will
encompass a variety of use cases, each having dis-
tinct sets of requirements (e.g., bandwidth, laten-
cy, scalability, and availability). A real-life scenario
depicting some of these use cases is illustrated in
Fig. 1. It consists of sharing high-resolution video
feeds along with braking data among vehicles to
enable motorists to adjust their driving to traffic
conditions and to anticipate sudden stops, and
streaming high-definition multimedia content for
passengers.
Provisioning resources to fulfill the variety of
requirements of these applications is an ardu-
ous task given today’s one-size-fits-all networks.
Indeed, accommodating these applications while
supporting existing services requires a program-
mable and flexible network infrastructure that can
be tailored to the specific needs of each appli-
cation. Besides, guaranteeing service continuity
between realms belonging to different network
providers is still a challenge. For instance, SP1 in
Fig. 1 cannot fulfill the blue car’s service requests
throughout its journey (i.e., from home to office
passing by the school) as it lacks coverage and
computational capabilities. A possible way to alle-
viate this problem is network sharing. It enables
network operators to share their infrastructure to
reduce capital/operating expenditures (CAPEX/
OPEX) and to offer lower-priced services to cus-
tomers. However, the way mobile networks are
built and operated limits the network operators’
ability to create novel services that can support
the diverse requirements of emerging 5G use
cases [1].
5G achieves such a design by integrating two
key technologies: network slicing and mobile
edge computing (MEC). The former splits the
physical network infrastructure into multiple log-
ical networks, called slices, which are controlled
and managed independently by slice owners.
The latter deploys computing resources near end
users to enable low-latency and high-bandwidth
network access. While flexibility is emphasized
through the network slicing dynamics, providing
real-time end-to-end services that can involve dif-
ferent operators is still a challenge. Indeed, there
is a clear urgency to design innovative techniques
to enable network slicing interoperations that
can span over multiple administrative domains.
In this regard, a centralized capacity broker was
proposed in [2], which is built on top of the Third
Generation Partnership Project (3GPP) network
sharing management architecture to enable net-
work operators to lease resources on the fly for
a particular time period. This scheme was large-
ly improved in [3] to optimize the on-demand
allocation of resources based on mobile traffic
forecast. An Internet of Things (IoT) broker was
proposed in [4] to enable operators to offer net-
work slices as a service in order to optimize slice
resource orchestration. In [5], a management and
orchestration architecture that deploys a broker-
ing layer based on software defined networking
was proposed to create end-to-end slices and allo-
cate computing and storage capacities at three
levels: sub-domain, domain, and multi-domain.
Finally, a brokering system that uses a reinforce-
ment learning algorithm was introduced in [6] to
dispatch resource requests to different network
operators considering constraints such as delay
and geographical location.
Despite their ingenuity, these approaches
along with other existing ones face two main
challenges: scalability: as the number of operators
(and therefore the number of slices) increases,
the broker may be overwhelmed, impacting the
Mohammed Amine Togou, Ting Bi, Kapal Dev, Kevin McDonnell, Aleksandar Milenovic, Hitesh Tewari, and Gabriel-Miro Muntean
ACCEPTED FROM OPEN CALL
This article introduces
a distributed block-
chain-enabled network
slicing (DBNS) framework
that enables service
and resource providers
to dynamically lease
resources to ensure high
performance for their
end-to-end services.
Mohammed Amine, Ting Bi, and Gabriel-Miro Muntean (corresponding author) are with Dublin City University; Kapal Dev and Hitesh Tewari
(corresponding author) are with Trinity College Dublin; Kevin McDonnell and Aleksandar Milenovic (corresponding author) are with Huawei Technologies Co.
Digital Object Identifier:
10.1109/MCOM.001.2000112
DBNS: A Distributed Blockchain-Enabled
Network Slicing Framework for 5G Networks
IEEE Communications Magazine • November 2020 3
performance of the whole ecosystem; and com-
plexity: to use network slices of other operators,
memoranda of understanding (MoUs) need to
be established based on pre-defined service level
agreement (SLA) requirements. This is a lengthy
process.
The main contribution of this article is the
design of a signaling-based distributed on-demand
framework, called distributed blockchain-enabled
network slicing (DBNS), to enable end-to-end and
on-the-fly leasing of resources to support service
continuity while meeting quality of service (QoS)
requirements. The key enabler of our distributed
on-demand architecture is global service provi-
sioning (GSP), a control and monitoring compo-
nent that provides admission control for incoming
requests along with resource assignment by
means of a blockchain-based bidding system.
The rest of this article is organized as fol-
lows. First, we describe the technology enablers
of DBNS. Then we present the fundamentals of
network slicing orchestration and its business
requirements. Next, we introduce the DBNS
architecture and describe how it can be deployed
and used. Afterward, we analyze DBNS perfor-
mance through a case study that focuses on video
streaming applications. Finally, we present our
conclusions along with future research directions.
dbns technology enAblers
After the early deployments of 3G networks,
network sharing was introduced to help mobile
operators accelerate their network rollouts as
well as offer various services to their customers
with reduced costs. Passive sharing and network
roaming were the initial network sharing solutions.
The former designates the sharing of site locations
or physically supporting infrastructure of radio
equipment (i.e., mast), while the latter denotes
the ability of subscribers to use networks of other
operators based on contractual agreements [2].
Then active radio access network (RAN) sharing
followed. It consists of sharing active network
equipment including base stations, antennas, and
mobile backhaul equipment [7]. This allowed
mobile operators to merge spectrum resources
on the basis of contractual agreements. However,
with the continuous growth of data traffic gen-
erated by a plethora of emerging applications,
new challenges that go beyond the original RAN
sharing concept have been introduced. As a
result, mobile operators had to think of new ways
to redesign their networks to address these con-
cerns.
Network slicing is a concept that has been
proposed to cope with the surge in mobile data
traffic. It is based on two technologies: Soft-
ware-Defined Networking [8] and Network Func-
tion Virtualization to allow for efficient network
management while enabling flexible network cus-
tomization to meet traffic requirements. Using
network slicing, operators can build multiple iso-
lated virtual networks on a shared physical infra-
structure. These logical networks, called slices,
are self-contained and orchestrated in different
ways depending on their service requirements
and can be owned by one or multiple tenants.
This provides new revenue opportunities for
mobile operators as slices can be used by other
operators, offering efficient utilization of the infra-
structure. Still, innovative approaches for efficient
and secure end-to-end network slicing admission
control that can span over multiple administrative
domains need to be investigated.
Lately, blockchain (BC) has been integrated in
5G networks to mitigate various security concerns
as it offers immutability, transparency, decentral-
ization, and privacy. Its applications in 5G can
be classified into three categories: supporting 5G
technology enablers such as MEC [9]; providing
efficient 5G services like network management
and virtualization [5]; and endorsing 5G IoT appli-
cations [10].BC is a peer-to-peer decentralized
distributed ledger that permanently and chrono-
logically records and ensures immutable and
unchangeable truthful transactions in untrusted or
partially trusted networks via cryptography-based
consensus mechanisms [11]. A simple BC oper-
ation goes through the steps illustrated in Fig. 2.
First, an entity (e.g., computer) requests a trans-
action that is broadcast to all nodes in the peer-
to-peer (P2P) network. All nodes in the network
validate the transaction using the requested enti-
ty’s public key. Once verified, the transaction is
linked to other transactions to create a new data
block, which is appended to the existing block-
chain, indicating the completion of the transac-
tion. Once the transaction has been locked into
a block, the other participants in the P2P network
can create their own transactions and broadcast
them over the BC P2P network to be included in
the next block on the ledger.
There are two types of BC: public and private.
Our focus in this article is on private BC as we
aim to design a network where only a finite num-
ber of entities can access it [12]. There are mul-
tiple platforms that enable the creation of such
networks. For instance, Multichain is a permis-
sioned blockchain that allows multiple networks
to simultaneously be on a single server and has
compatibility with the bitcoin network, including
transaction/block formats, P2P protocols, digital
signature schemes, and application programming
interfaces (APIs). But the main problem with Mul-
tichain is the lack of support for smart contracts.
Unlike Multichain, Ethereum supports smart con-
tracts; however, it suffers two major problems:
Figure 1. Sample of real-life use cases for the automotive vertical. The blue car
is an autonomous vehicle that requires surrounding cars to share two ele-
ments: high-resolution real-time video feeds to adjust the driving to traffic
conditions (see-through), and braking data to anticipate sudden stops. Fur-
thermore, high-quality entertainment services (e.g., games and movies) are
streamed via its built-in entertainment system to its passengers.
IEEE Communications Magazine • November 2020
4
anyone can connect to the network, and all data
inside smart contracts is visible to all nodes. To
mitigate these issues, Quorum was proposed. It
is an Ethereum-based digital ledger technology
(DLT) that provides a layer on top of Ethereum to
enable the implementation of private transactions
and to enhance the BC network robustness via
the deployment of different consensus algorithms.
Some of Quorum’s most promising features, with
respect to our approach, are summarized below:
Privacy: It supports private transactions and
private contracts through public/private
state separation and uses constellation, a
P2P encrypted message exchange, for the
transfer of private data among network par-
ticipants.
Peer Permissioning: It allows node/peer per-
missioning using smart contracts, ensuring
that only known parties can join the net-
work.
Higher Performance: It offers significantly
higher performance (100 transactions/s)
compared to Ethereum.
Alternative Consensus Mechanisms: It offers
multiple consensus mechanisms that are
more appropriate for consortium chains.
network slIcIng PlAyers And
busIness requIrements
From the technical point of view, a network slice
is an independent logical network that runs on a
shared physical infrastructure capable of provid-
ing an agreed service quality. From the business
perspective, deploying network slicing will enable
different players to achieve strategic commer-
cial goals such as increasing return on investmet
(RoI), enhancing network capacity, and expand-
ing network coverage. We identify four players,
described as follows:
Mobile Network Operator (MNO): in charge
of deploying and maintaining the physical
network.
Mobile Virtual Network Operator (MVNO):
lacks network infrastructure and leases
resources from an MNO.
Over-The-Top Service Provider (OTT): oper-
ates on top of a network infrastructure
according to a pre-defined set of require-
ments that are specified in SLAs signed with
MNOs/MVNOs.
Vertical Industry (VI): a set of applications
that are specific to an industrial sector (e.g.,
automotive, fabrication, entertainment). They
use the network infrastructure to provide ser-
vices to end users.
Given that the network infrastructure may belong
to either MNOs or MVNOs, addressing the fol-
lowing questions is of paramount importance for
these two players to decide whether or not to
invest in network slicing: Is it beneficial to their
businesses? Can they remain competitive? To this
end, the GSMA Network Slicing Taskforce (NEST)
specified in [13] three considerations when invest-
ing in network slicing. They are summarized here:
Complexity: MNOs/MVNOs need to engage
in standardization activities in order to min-
imize the technical solutions’ complexity so
that adoption can be made relatively easy.
Deployment Scenarios: All players should
agree on the commercial deployment sce-
narios for network slicing to drive economies
Figure 2. Distributed blockchain network slicing (DBNS) architecture.
Given that the network
infrastructure may
belong to either MNOs
or MVNOs, addressing
the following ques-
tions is of paramount
importance for these
two players to decide
whether or not to invest
in network slicing:
Is it beneficial to their
businesses?
IEEE Communications Magazine • November 2020 5
of scale.
Deployment Cost: MNOs/MVNOs need to
work together to make the cost of deploying
network slicing marginal to the broader 5G
investment.
While the 3GPP Service Working Group SA1
described in [14] the requirements for various
use cases that are related to network slice deploy-
ment (e.g., end-to-end asset tracking and wind
farm communication networks), the 3GPP Service
Working Group SA5 presented in [15] use cases
and requirements for management and orchestra-
tion of network slicing, including multiple-operator
coordination management. Assume that operator
A wants to create an end-to-end network slice to
support a service across multiple operators (i.e.,
operators B and C). SA5 enumerates the steps to
accomplish this task, summarized as follows:
Operator A makes the service request to
operators B and C asking them to allocate
resources (i.e., slices) for the service.
Operators B and C can either create new
slices or use existing ones.
• Operators B and C should provide manage-
ment data (e.g., performance data) when
requested by operator A.
Operator A is responsible for the manage-
ment of the end-to-end network slice.
The degree of trust between the different play-
ers can have an impact on the entire ecosystem.
Indeed, VIs and OTTs must trust MNOs/MVNOs
to provide the necessary resources. In addition,
MNOs/MVNOs must ensure that the control
provided to VIs and OTTs does not allow them
to negatively impact their network infrastructure.
Finally, MNOs/MVNOs must trust one another to
provide the required resources for services span-
ning multiple administrative domains. For this to
happen, additional considerations are needed to
provide an appropriate level of control and mon-
itoring.
dIstrIbuted blockchAIn-bAsed
network slIcIng FrAmework
DBNS is a distributed solution that enables net-
work operators to request resource provisioning
from other operators in case they cannot fulfill
the requested services. Figure 2 depicts its block
architecture. It has three components: GSP, slice
orchestrator (SO), and infrastructure manager
(IM). GSP is in charge of mapping resource pro-
visioning requests to appropriate network slices.
This is done through a blockchain-based bidding
system that enables all operators having a GSP
to participate in the bidding process. It has two
modules.
Request-Resource Matcher (RRM): responsi-
ble for handling customer requests and mapping
them to the suitable network slices. When receiv-
ing a customer service request, it first verifies
whether the current provider can fulfill the service
by probing the SO. If not, the RRM plays the role
of a broker by broadcasting the service provision-
ing request over the blockchain and selecting the
best bid among the ones received from the other
operators.
Blockchain Unit (BU): responsible for writ-
ing resource provisioning requests to the block-
chain and fetching their corresponding bids.
The resource provisioning requests, called bid
requests, are advertised in plain text, while the
matching bids, called bid replies, are encrypted
using the public key of the requesting operator.
The SO provides end-to-end network slice
orchestration either locally or across multiple
administrative domains. It has two modules.
Local Resource Orchestrator (LRO): provides
an abstract view of the underneath infrastructure
to GSP with the help of IM. It makes decisions
about creating new slices and updating existing
ones to include virtual/physical network func-
tions. It also keeps track of utilization status of the
various slices and monitors the QoS metrics to
comply with SLA requirements.
Multi-GSP Resource Orchestrator (MGRO):
allocates the appropriate resources (i.e., by cre-
ating new slicing or upgrading existing ones) for
the requested service if the bid reply is selected
and monitors the QoS metrics to ensure that SLA
requirements are properly met. It also enables
seamless service transition from one operator to
another and provides usage reports to be used for
billing purposes.
Finally, IM manages the underlying physical/
virtual infrastructure. It provides support for slic-
ing, enforces slice requirements from the SO, and
provides infrastructure monitoring and analysis
services.
To allow for a secure and efficient service pro-
visioning, DBNS has five phases.
Phase 0 — Setup: An operator willing to join
the DBNS framework is required to obtain a
public key certificate from a trusted third party
(TTP) such as a commercial certification authority
(CA). This certificate is then shared with existing
partners (i.e., operators that are already mem-
bers of the DBNS framework) to ask to join the
framework. Upon agreement, partners virtually
approve the operator’s request. This latter then
signs the GSP-based onboarding digital contract,
which specifies the activities that can be per-
formed and the rules to abide by. This includes
requesting resource provisioning from other part-
ners by broadcasting bid requests and sending bid
replies. If the placed bid is selected, partners have
the obligation of fulfilling the requested service
according to the agreed SLA requirements.
Phase 1 — Consumer Request: To avail of the
various services, consumers send service requests
(SREQs) to their network operators. Each SREQ
contains the consumer ID, the service require-
ments (e.g., bit rate, loss range, latency), a time
period during which the service is needed, and
the location where the service is to be provided.
When received, the RRM forwards the service
requirements to the SO. This latter probes the
LRO to verify whether the service can be fulfilled
locally. With the help of IM, the LRO sends a sta-
tus message to the RRM. If the service can be
supported, Phase 3 is executed. Otherwise, Phase
2 is carried out.
Phase 2 — BC-Based Bidding: If the service
cannot be fulfilled locally, the RRM encapsulates
an SREQ into a bid request (BREQ) containing
the request ID along with the ID of the request-
ing operator and forwards it to the BU. This latter
writes BREQ into the blockchain. DBNS makes
use of a permissioned blockchain to solicit bids
from different partners in the ecosystem.
The degree of trust
between the different
players can have an
impact on the entire
ecosystem. Indeed,
VIs and OTTs must
trust MNOs/MVNOs to
provide the necessary
resources. In addition,
MNOs/MVNOs must
ensure that the control
provided to VI and OTTs
does not allow them to
negatively impact their
network infrastructure.
IEEE Communications Magazine • November 2020
6
Each partner’s BU fetches the BREQ from the
blockchain and hands it to the RRM, which gets
the encapsulated SREQ. The RRM then sends
the service requirements to the MGRO to verify
whether the service can be supported. If yes, the
RRM makes an offer (i.e., includes the minimum
and maximum supported service requirements
along with the price), encapsulates it into a bid
reply (BREP), signs it with the public key of the
requesting operator, and forwards it to the BU.
The signature is used to prevent other providers
from obtaining any details about the bid, ensuring
a fair and transparent competition. The BU adds
the BREP transaction to the blockchain. The BU
of the requesting operator fetches all BREQs and
forwards them to the RRM. This latter decrypts
them using its private key, gets the different offers,
and chooses the one that perfectly suits the needs
of its customer. At this stage, the requesting oper-
ator executes a “smart contract” on the BC, which
locks in the customer and the operator providing
the service (i.e., the bid winner). The smart con-
tract is used to hold both parties accountable in
terms of their respective obligations.
Phase 3 — Service Provisioning: In the case
of local service provisioning (Phase 3a in Fig. 3),
the RRM asks the LRO to allocate the necessary
resources to meet the service requirements and
to start the service. Once the service is complet-
ed, the RRM generates the usage report along
with the bill and sends it to the customer. If the
service is to be provided by another partner, the
corresponding RRM asks the MGRO to allocate
the necessary resources and to start the service.
Once the service is completed, the RRM gen-
erates the usage report along with the bill and
adds them to the blockchain (i.e., encrypted with
the public key of the requesting operator). The
BU of the requesting provider fetches the report
along with the bill and forwards them to the RRM,
which transmits them to the consumer (Phase 3b
in Fig. 3).
Phase 4 — Termination: An operator can leave
the DBNS framework voluntarily by broadcasting
a terminate message via the blockchain. Before
departing, the operator should make sure that
no new service provisioning requests are accept-
ed and that all ongoing services are complet-
ed. Upon approval, partners then terminate the
operator’s GSP-onboarding contract and write
the transaction on the blockchain (Phase 4 in
Fig. 3). Partners can also impose sanctions on an
operator in the case of recurrent noncompliance
with SLA requirements. In this regard, bid request
requirements are compared against usage sum-
mary reports, and penalties (e.g., boycotting the
bid replies of the inspected operator for a period
of time) may apply for reported transgressions.
cAse study: entertAInment servIces
This section presents a simulation-based per-
formance evaluation of DBNS. The case study
considered replicates a real-life situation where a
customer UA of a network operator SPA streams
Youtube videos with resolutions 720p and 1080p,
Figure 3. DBNS sequence diagram illustrating the various phases.
Table 1. Simulation setup parameters.
IEEE Communications Magazine • November 2020 7
plays high resolution 3D games (i.e., with a 2K
video component), and watches 4K Netflix mov-
ies. These entertainment services have high bit
rate requirements of 2 Mb/s, 4 Mb/s, 15 Mb/s,
and 25 Mb/s. UA is connected via base station
BSA.
We assume that BSA has a dedicated network
slice for entertainment services that is already
overloaded as it is serving multiple concurrent
users. In the same area, operators SPB and SPC
offer services via base station BSB and access
point APC, respectively. Two scenarios are con-
sidered:
SPA only uses its encumbered network slice
(between BSA and UA) to fulfill UA’s service
requests. This scenario is labeled Without
DBNS. Given that existing designs either
have no performance evaluation or are not
suitable for comparison with our proposed
architecture due to the use of auxiliary tech-
nologies, the Without DBNS approach is
chosen as a benchmark.
SPA employs the proposed DBNS approach
to request service provisioning from SPB and
SPC. This scenario is labeled With DBNS. SPA
selects SPC’s bid as it has enough network
resources to be allocated to UA. The service
is fulfilled via the link between APC and UA.
Other simulation parameters are summarized in
Table 1.
Figure 4 shows how, by employing the pro-
posed DBNS, the supported throughput is equiva-
lent to the bit rate required by the various services
(i.e., 2 Mb/s for 720p, 4 Mb/s for 1080p, 15
Mb/s for 2K, and 25 Mb/s for 4K). Figure 4a also
shows that without deploying DBNS, only the bit
rates of 720p and 1080p services can be sup-
ported due to the lack of sufficient resources at
BSA. Figure 4b depicts the average delay and loss
rate when using both approaches. Using DBNS,
the loss rate is almost 0, while the average delay
ranges between 20 and 25 ms for the different
services. Without DBNS, the average delay is
between 19 and 22 ms, which matches the one
incurred by DBNS, particularly for 2K and 4K ser-
vices. This is because the average delay in this
case only considers the supported throughput
for both services (i.e., 8 Mb/s each) and not the
required one. Furthermore, the loss rate is exorbi-
tant for 2K (i.e., 50 percent) and 4K (i.e., 70 per-
cent) services, which significantly affects the users’
quality of experience.
conclusIons
This article discusses network slicing technology,
describing its major players and business require-
ments in the context of the 5G technology. It
then introduces the DBNS framework, which pro-
motes dynamic resource leasing between differ-
ent providers to support high performance for
end-to-end services. It has two key components
and their associated mechanisms: GSP, which
provides admission control for incoming requests
by means of a blockchain-based bidding system,
circumventing the lengthy process of setting up
MoUs; and the MGRO, which supports seamless
service transition from one entity to another along
with monitoring QoS metrics to ensure that SLA
requirements are met.
We believe that DBNS is a fundamental leap
forward as it enables network operators to move
toward a more flexible and on-demand way of
leasing and procuring network infrastructure and
assets to fulfill services in situations where infra-
structure cannot meet demand, and to provide
more dynamic capacity when demand spikes are
experienced (i.e., “pop-up” networks for large
sporting events). This can help network operators
decrease both their CAPEX and OPEX costs and
increase their revenues.
Future research directions could consider the
analysis of other context-aware, multi-tenant uses
cases and design of innovative resource alloca-
tion techniques considering the isolation require-
ment. In addition, the evaluation of DBNS from
business, policy, and legal perspectives could be
realized. Finally, blockchain performance optimi-
zation in terms of transaction rate and scalabili-
ty can be evaluated through the use of different
data structures as well as deployment of multiple
chains or channels.
Acknowledgment
The Science Foundation Ireland (SFI) support,
co-funded by the European Regional Devel-
opment Fund, via research grants 16/SP/3804
Figure 4. Simulation results of the various requested services with and without use of DBNS: a) average throughput; b) average delay
and average loss rate.
(a) (b)
IEEE Communications Magazine • November 2020
8
(Enable) and 12/RC/2289_P2 (Insight) is grateful-
ly acknowledged.
reFerences
[1] 3GPP, “Feasibility Study on New Services and Markets Tech-
nology Enablers for Critical Communications,” Tech. Rep.
22.862, R. 14, 2016.
[2] K. Samdanis, X. Costa-Perez, and V. Sciancalepore, “From
Network Sharing to Multi-Tenancy: The 5G Network Slice
Broker,” IEEE Commun. Mag., vol. 54, no. 7, July 2016, pp.
32–39.
[3] V. Sciancalepore et al., “Mobile Traffic Forecasting for Maxi-
mizing 5G Network Slicing Resource Utilization,” IEEE INFO-
COM, May 2017, pp. 1–9.
[4] V. Sciancalepore, F. Cirillo, and X. Costa-Perez, “Slice as a
Service (SlaaS) Optimal IoT Slice Resources Orchestration,”
IEEE GLOBECOM, Dec 2017, pp. 1–7.
[5] T. Taleb et al., “On Multi-Domain Network Slicing Orches-
tration Architecture and Federated Resource Control,” IEEE
Network, vol. 33, no. 5, Sept./Oct. 2019, pp. 242–52.
[6] G. Kibalya et al., “A Reinforcement Learning Based Approach
for 5G Network Slicing Across Multiple Domains,” Proc.
15th Int’l. Conf. Network and Service Management, Oct.
2019, pp. 1–5.
[7] A. Devlic et al., “NESMO: Network Slicing Management and
Orchestration Framework,” Proc. IEEE ICC Wksps.), May
2017, pp. 1202–08.
[8] M. A. Togou et al., “A Hierarchical Distributed Control Plane
for Path Computation Scalability in Large Scale Software-De-
fined Networks,” IEEE Trans. Network and Service Manage-
ment, vol. 16, no. 3, Sept. 2019, pp. 1019–31.
[9] H. Yang et al., “Blockchain-Based Hierarchical Trust Net-
working for Jointcloud,” IEEE Internet of Things J., vol. 7, no.
3, 2020, pp. 1667–77.
[10] H. Yang et al., “Distributed Blockchain-Based Trusted
Multi-Domain Collaboration for Mobile Edge Computing
in 5g and Beyond,” IEEE Trans. Industrial Informatics, 2020,
pp. 1–1.
[11] H. Tewari, “Blockchain Research Beyond Cryptocurren-
cies,” IEEE Commun. Standards Mag., vol. 3, no. 4, Dec.
2019.
[12] M. Belotti et al., “A Vademecum on Blockchain Technol-
ogies: When, Which, and How,” IEEE Commun. Surveys &
Tutorials, vol. 21, no. 4, 2019, pp. 3796–3838.
[13] GSMA. “Network Slicing Use Case Requirements,” Apr.
2018; https://www.gsma.com/futurenetworks/wp-content/
uploads/2018/07/Network-Slicing-Use-Case-Requirements-
fixed.pdf.
[14] 3GPP, “Feasibility Study on Business Role Models for Net-
work Slicing,” Tech. Rep. 22.830, Rel. 16, Dec. 2018.
[15] 3GPP, “Study on Management and Orchestration of Net-
work Slicing for Next Generation Network,” Tech. Rep.
28.801, Rel. 16, Jan. 2018.
bIogrAPhIes
MohaMMed aMine Tog ou is a postdoctoral researcher with the
Performance Engineering Laboratory at Dublin City University
(DCU), Ireland. He received B.S. and M.S. degrees in computer
science and computer networks from Al Akhawayn University,
Ifrane, Morocco, and a Ph.D. degree in computer science from
the University of Montreal, Canada. His current research inter-
ests include 5G networks, SDN-NFV, network slicing, and IoT.
Ting Bi is a postdoctoral researcher with the Performance Engi-
neering Laboratory at DCU. He received a B.Eng. in software
engineering from Wuhan University, China, in 2010, and M.Eng.
and Ph.D degrees in telecommunications from DCU in 2011
and 2017, respectively. His research interests include mobile
and wireless communications, multimedia, and multi-sensory
media streaming.
Kapa l d ev is a research fellow with the CONNECT Centre,
School of Computer Science and Statistics, Trinity College Dub-
lin. He was awarded a Ph.D. degree by Politecnico di Milano,
Italy, in July 2019. His research interests include blockchain,
5G beyond networks, and artificial intelligence. Previously, he
worked as a 5G junior consultant and engineer at Altran Italia
S.p.A, Milan. He is coordinating two Erasmus+ International
Mobility projects.
Kevi n Mcdo nnell is an architect at the Huawei Ireland
Research Centre. His recent work focuses on autonomous net-
work operations using knowledge management, intent, and
machine learning. He serves as workstream leader for Autono-
mous Networks in the TM Forum, and participates in standard-
ization activities in 3GPP and GSMA. He is an active contributor
to the ONAP project and is company leader for EU Horizon
2020 Project 5GTANGO.
aleKsandar Milenovic is a Huawei chief architect for Autono-
mous Network Operations and director of the Communications
Technology Lab in the Huawei Ireland Research Center. He
has nearly 20 years of experience in developing products in the
area of telco operations and maintenance (O&M). He is leading
research in intelligent qutomation of telco operations.
hiTesh Tewari is an assistant professor in the School of Comput-
er Science and Statistics at Trinity College Dublin. His research
interests lie in the areas of network security and applied cryptog-
raphy. In recent years he has been actively working in the area
of distributed ledger technologies.
gaBriel-M iro Mun Tean (gabriel.muntean@dcu.ie) is an associ-
ate professor with the School of Electronic Engineering, DCU,
and co-director of the DCU Performance Engineering Labo-
ratory. He was awarded a Ph.D. degree by DCU in 2004. His
research interests include quality-, energy-, and performance-re-
lated issues of rich media content delivery. He is an Associ-
ate Editor of IEEE Transactions on Broadcasting and Multimedia
Communications Area Editor of IEEE Communication Surveys &
Tutorials. He coordinated the EU Horizon 2020 project NEW-
TON.
... Boateng et al. [103] propose a blockchain-enabled layered architecture for autonomous resource slicing in 5G RAN. Togou et al. [104] propose a network slicing architecture that supports distributed blockchain, enabling end-to-end real-time resource leasing and allocation. Wang et al. [105] propose a new network architecture for 6G trusted wireless communication, namely B-RAN, to realize the deep integration of blockchain and wireless communication. ...
... Propose a blockchain-enabled layered architecture for autonomous resource slicing in 5G RAN. [104] To achieve end-to-end real-time resource leasing and allocation. ...
Article
Full-text available
The virtual world created by the development of the Internet, computers, artificial intelligence (AI), and hardware technologies have brought various degrees of digital transformation to people’s lives. With multiple demands for virtual reality increasing, the metaverse, a new type of social ecology that can connect the physical and virtual worlds, is booming. However, with the rapid growth of data volume and value, the continuous evolution of the metaverse faces the demands and challenges of privacy, security, high synchronization, and low latency. Fortunately, the ever-evolving blockchain and intelligent networking technologies can be used to satisfy the trusted construction, continuous data interaction, and computing demands of the metaverse. Therefore, it is necessary to conduct an in-depth review of the role and gains of blockchain, intelligent networking, and the combination of both in providing the immersive experiences of the metaverse. In this survey, we first discuss the development trend, characteristics, and architecture of the metaverse. Then, the existing work on blockchain, networking, and the combination of the two technologies are reviewed, including overviews, applications, and challenges. Next, applications of the metaverse are summarized, emphasizing the importance of the metaverse and the fields of development. Finally, we discuss some open issues, challenges, and future research directions.
... For network slicing (NS), the authors of [33] propose DBNS, a Distributed BC-enabled NS framework, which employs a BC-based bidding mechanism for dynamic resource leasing and service provisioning. In [33], HLF is used to provide an end-to-end BC-enabled slicing solution for mobile 5G networks, while Ethereum SCs are used in [34] to automatically manage and negotiate trust relations between actors for slice deployment. ...
... For network slicing (NS), the authors of [33] propose DBNS, a Distributed BC-enabled NS framework, which employs a BC-based bidding mechanism for dynamic resource leasing and service provisioning. In [33], HLF is used to provide an end-to-end BC-enabled slicing solution for mobile 5G networks, while Ethereum SCs are used in [34] to automatically manage and negotiate trust relations between actors for slice deployment. Many additional studies leverage the benefits of BC and SCs to create NS brokering solutions, such as NSBchain [35], a PBFT-based HLF framework that enables automated and secure network resource allocation between brokers and tenants. ...
Conference Paper
Full-text available
Cellular networks have played a critical role in building today’s Internet. However, they are facing more and more challenges such as softwarization and programmability, decentralization, as well as opening to new business models, while keeping a very high level of trust and reliability. DLT (Distributed Ledger Technology) is a promising field to address these challenges in an innovative way. In this paper, we present a comprehensive analysis of DLT applications for cellular networks, covering the Radio Access Network (RAN), Core Network (CN), Applications & services, as well as Inter-actor communication & cooperation.
... Thus, interconnecting MNOs requires building trust between them to ensure continuous delivery of V2X-NS services and prevent attackers from exploiting this interconnection point to break or disrupt V2X-NS. To this end, blockchain and smart contracts could be the best candidates to build trust here and protect ML/DL-based attack detection systems [14]. However, blockchain-based solutions should deal with context-related obstacles such as scalability issues that come with the increased number of users and the V2X-NSs policy, legislation, and regulation issues since home and visited MNOs belong to separate administrative domains. ...
Article
5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use-cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities.
... A blockchain-based distributed network slicing framework is proposed in [129], which enables the dynamic leasing of resources to the service tenants by the resource providers to enhance the performance and QoS provision. The prominent aspect of this framework is the Global Service Positioning (GSP) system, which allows the new users to make a service request and control their admission through a blockchainbased auction type bidding system for dynamic resource allocation. ...
Article
Full-text available
Dynamic spectrum access (DSA) and network slicing are some of the principal concepts to realize the emerging applications in Beyond 5th Generation (B5G) and 6th Generation (6G) networks. The frequency spectrum remains scarce and underutilized, while the performance requirements in terms of data throughput and latency of the network tenants have diversified. DSA allows for the efficient utilization of spectrum resources, while network slicing aims to serve network users with highly distinctive service needs. Lack of incentivization, sharing of spectrum resources among multiple operators, and lack of trust between operators are some of the challenges faced by centralized DSA approaches. Similarly, secure network slice orchestration, slice-isolation, secure access to network resources, privacy of user sensitive data, assuring the provision of Service Level Agreements (SLAs), are some of the challenges in existing network slicing techniques. Blockchain due to its innate capabilities can be a promising technology to solve the key issues pertaining to current DSA and network slicing approaches. Blockchain through smart contracts, provides traceability of network resources, auditability and accountability of network operators and service providers. Smart contracts facilitate the automation of resource sharing and network slice orchestration, while ensuring that SLAs are met, and network operators are compensated. This paper first provides a comprehensive overview of the DSA concept, the existing DSA techniques, and the challenges posed by these techniques. This is followed by a detailed description of network slicing, its key elements and architecture, various network slicing parameters, existing network slicing techniques and their challenges. Then an in-depth review on blockchain, its working principle, factors that affect blockchain implementation, and a comparison of various open-source blockchain platforms that support smart contracts is presented. This discussion is summarized by presenting the state-of-the-art in the blockchain-enabled DSA and network slicing, challenges and trade-offs of these techniques, and the gaps and future directions in this research area. Finally, we conclude by providing some future research directions.
... Thus, blockchain has been proposed in MEC slicing to guarantee security in resource trading, dynamic resource provisioning, and better network performance. The authors of [13] and [14] provided a distributed blockchainbased NS (DBNS) scheme that allows dynamic leasing of resources, including MEC by service providers and resource providers, to guarantee good performance for services. According to [15], a secure and transparent slicing technique that creates MVNO slices via blockchain technology was suggested. ...
Article
We investigate the computing resource allocation in multi-access edge network slicing (NS) in the context of revenue and multi-access edge computing (MEC) resource management. The significant variety of slice resource utilization levels across slice tenants (i. e., Mobile Virtual Network Operators (MVNOs)) challenges MEC resource management in NS with MEC, leading to virtual machine resource (VMR) (i. e., computing resource) wastage or scarcity. As a result, for efficient MEC resource management, the infrastructure provider (InP) encourages dynamic resource sharing and trading (DRST) of unutilized slice VMR quotas. Nevertheless, cellular network security and privacy issues deter MVNOs from collaborating on effective DRST. The security characteristics inherent in blockchain have recently gained much interest for secure resource trading. Thus, this paper proposes a unique hierarchical blockchain-based inter-slice computing resource trading (ISCRT) scheme for peer-to-peer (P2P) MVNOs in an autonomous multi-sliced MEC-based 5G network. For secure ISCRT transactions, a consortium blockchain network with hyperledger smart contracts (SC) is designed. We model the demand and pricing problems of buyer and seller MVNOs for the unutilized VMRs using a two-stage Stackelberg game. Then, to obtain the Stackelberg equilibrium (SE), an enhanced dueling double deep Q-network (D3QN) algorithm is proposed, which intelligently determines the optimal demand and pricing policies of MVNOs for the unutilized VMRs during ISCRT transactions at negotiation intervals. Simulation analysis shows that the proposed enhanced D3QN algorithm outperforms benchmark schemes in terms of the MVNO slice-level satisfaction and VMR utilization while reducing double-spending attacks in ISCRT settings by 16% and increasing both players’ utility.
Article
Full-text available
One of the key requirements of a properly functioning digital society is the implementation of a decentralized identity management scheme through which the identity of every citizen can be uniquely determined. Specifically, we believe what is required is for a PKI to be deployed at a global scale. A PKI consists of a collection of digital certificates that cryptographically bind an individual's identity to their public key. In this article, we present an overview of our recent work in the areas of identity management and privacy, with specific emphasis on the deployment of a blockchain backed PKI. Once a PKI is in place, we are in a position to perform a number of common network tasks much more securely and efficiently than we can do currently.
Article
Full-text available
Blockchain is a technology making the shared registry concept from distributed systems a reality for a number of application domains, from the cryptocurrency one to potentially any industrial system requiring decentralized, robust, trusted and automated decision making in a multi-stakeholder situation. Nevertheless, the actual advantages in using blockchain instead of any other traditional solution (such as centralized databases) are not completely understood to date, or at least there is a strong need for a vademecum guiding designers toward the right decision about when to adopt blockchain or not, which kind of blockchain better meets use-case requirements, and how to use it. In this article we aim at providing the community with such a vademecum, while giving a general presentation of blockchain that goes beyond its usage in Bitcoin and surveying a selection of the vast literature that emerged in the last few years. We draw the key requirements and their evolution when passing from permissionless to permissioned blockchains, presenting the differences between proposed and experimented consensus mechanisms, and describing existing blockchain platforms.
Article
Full-text available
Given the shortcomings of traditional networks, Software-Defined Networking (SDN) is considered as the best solution to deal with the constant growth of mobile data traffic. SDN separates the data plane from the control plane, enabling network scalability and programmability. Initial SDN deployments promoted a centralized architecture with a single controller managing the entire network. This design has proven to be unsuited for nowadays large-scale networks. Though multi-controller architectures are becoming more popular, they bring new concerns. One critical challenge is how to efficiently perform path computation in large networks considering the substantial computational resources needed. This paper proposes HiDCoP, a distributed high-performance control plane for path computation in large-scale SDNs along with its related solutions. HiDCoP employs a hierarchical structure to distribute the load of path computation among different controllers, reducing therefore the transmission overhead. In addition, it uses node parallelism to accelerate the performance of path computation without generating high control overhead. Simulation results show that HiDCoP outperforms existing schemes in terms of path computation time, end-to-end delay and transmission overhead.
Conference Paper
Full-text available
The increasing deployment of smart devices using mobile networks is pushing operators to consider efficient ways to tailor their infrastructure to the Internet of Things (IoT) diverse requirements and traffic characteristics. A promising approach to address this need is the novel concept of network slicing, which aims at allocating portions of network resources to specific tenants, such as enhanced mobile broadband (eMBB), IoT, e-health, connected vehicles, etc. While this has been traditionally done with long-term agreements between network operators and tenants as MVNOs, in this work we focus on a new business model where network operators offer network slices as a service (SlaaS). In particular, we propose a novel system comprising an IoT Broker managing massive IoT network slices services and a Network Slice Broker that through bi-directional negotiations are able to efficiently allocate and orchestrate network resources.
Conference Paper
Full-text available
This paper presents a novel network slicing management and orchestration architectural framework. A brief description of business scenarios and potential customers of network slicing is provided, illustrating the need for ordering network services with very different requirements. Based on specific customer goals (of ordering and building an end-to-end network slice instance) and other requirements gathered from industry and standardization associations, a solution is proposed enabling the automation of end-to-end network slice management and orchestration in multiple resource domains. This architecture distinguishes between two main design time and runtime components: Network Slice Design and Multi-Domain Orchestrator, belonging to different competence service areas with different players in these domains, and proposes the required interfaces and data structures between these components.
Article
To tackle the challenges introduced by the fast-growing charging demand of electric vehicles (EVs), the power distribution systems (PDSs) and fast charging stations (FCSs) of EVs should be planned and operated in a more coordinated fashion. However, existing planning approaches generally aim to minimize investment costs in PDSs while ignoring the risk of worsening traffic conditions. To overcome this research gap, this paper integrates the interests of traffic networks into PDS and FCS joint planning model to mitigate negative impacts on traffic conditions caused by installing FCSs. First, a novel microscopic method that is different from traditional assignment methods is proposed to simulate the influences of FCSs on traffic flows and EV charging loads. Then, a multi-objective joint planning model is developed to minimize both the planning costs and unbalanced traffic flows. A new bilayer Benders decomposition algorithm is designed to solve the proposed joint planning model. Numerical results on two practical systems in China validate the feasibility of our microscopic method by comparing the simulated results with real data. Compared with existing approaches, it is also demonstrated that the proposed joint planning approach helps to balance traffic flow assignments and relieve traffic congestion.
Article
Mobile edge computing (MEC) sinks computing power to the edge of networks and integrate mobile access networks and Internet services in 5G and beyond. With the continuous development of services, it is extremely important of privacy protection in a heterogeneous MEC system for multi- server collaboration. However, most of the existing schemes only consider the privacy of users or services other than privacy of network topology. For the purpose of topology privacy protection, this paper employs blockchain to construct heterogeneous MEC systems and adopts accommodative bloom filter as a carrier for multi-domain collaborative routing consensus without exposing topology privacy. Blockchain is used to implement multiplex mutual trust networking and collaborative routing verification through the membership service and consensus mechanism. Experiments are conducted to evaluate the feasibility and performances of our scheme. The results indicate that the proposed scheme can highly improve the credibility and efficiency of MEC collaboration.
Article
The Internet of Things (IoT) is becoming mature gradually and has already entered our daily life, which interconnects more machines and makes communication more convenient and more intelligent. Massive IoT devices produce innumerable data which need to be analyzed in Joint Cloud computation (JointCloud) with diversified services. However, due to the weak security of IoT devices, the existing JointCloud architecture hardly provides a secure trusted trade environment for users which affects severely the application in IoT network. In this paper, we propose a hierarchical trust networking architecture based on permissioned blockchain to implement JointCloud (HTJC). The proposed Hyperledger fabric based architecture has a better performance than those based on Ethereum in latency. By introducing the credit bonus-penalty strategy (CBPS), HTJC can solve the trust problem and provide users with a secure trusted trade environment. The availability of proposed architecture is evaluated and compared to the existing models. The numerical results show that the HTJC can defend DDoS attacks and provide users with trusted and effective trade platform.
Conference Paper
Network Function Virtualization (NFV) and Machine Learning (ML) are envisioned as possible techniques for the realization of a flexible and adaptive 5G network. ML will provide the network with experiential intelligence to forecast, adapt and recover from temporal network fluctuations. On the other hand, NFV will enable the deployment of slice instances meeting specific service requirements. Moreover, a single slice instance may require to be deployed across multiple substrate networks; however, existing works on multi-substrate Virtual Network Embedding fall short on addressing the realistic slice constraints such as delay, location, etc., hence they are not suited for applications transcending multiple domains. In this paper, we address the multi-substrate slicing problem in a coordinated manner, and we propose a Reinforcement Learning (RL) algorithm for partitioning the slice request to the different candidate substrate networks. Moreover, we consider realistic slice constraints such as delay, location, etc. Simulation results show that the RL approach results into a performance comparable to the combinatorial solution, with more than 99% of time saving for the processing of each request.
Article
A sophisticated and efficient network slicing architecture is needed to support the orchestration of network slices across multiple administrative domains. Such multi-domain architecture shall be agnostic of the underlying virtualization and network infrastructure technologies. Its objective is to extend the traditional orchestration, management and control capabilities by means of models and constructs in order to form a well-stitched composition of network slices. To facilitate such a composition of networking and compute/storage resources, this article introduces a management and orchestration architecture that incorporates Software Defined Networking (SDN) and Network Function Virtualization (NFV) components to the basic 3GPP network slice management. The proposed architecture is broadly divided into four major strata, namely the Multi-domain Service Conductor Stratum, Domain-specific Fully-Fledged Orchestration Stratum, Sub-Domain MANO and Connectivity Stratum, and Logical Multi-domain Slice Instance stratum. Each of these strata is described in detail, providing the fundamental operational specifics for instantiating and managing the resulting federated network slices.