Academia.eduAcademia.edu

Outline

Network Virtualization Utilizing Blockchain: A Review

2024, Journal of Applied Research in Electrical Engineering

https://doi.org/10.22055/JAREE.2024.46144.1110

Abstract

Network Virtualization (NV) techniques enable high scalability and isolation by abstracting physical resources to provide a logical network representation that can coexist with a physical networking framework. Traditional NV is prone to security attacks and has lower privacy and trustfulness compared to blockchain-established NV. We diagnose the BC-established NV construct under 5 segments and closely appraise the literature in reference to NV technique, virtualization technology, BC-related properties, and network properties. We racked up a starting sample of 85 sources by filtering literary work for qualifying conditions searched from article retrieval platforms, engaging a rigorous and prolonged approach. Anchored from this research, in BC-established NV, we demonstrate that BC can act as a broker/manager for NV, act as a secure storage by preventing double-spending attacks, provide secure virtual network embedding with high fault tolerance, engage BC and smart contacts for resource trading in the process of NV, engage dedicated consensus approaches to reach agreement for NV among multiple parties for reducing security attacks, and establish BC-established access control for NV. Complete interpretation disseminates that from interpreted BCestablished NV schemes, 45% engage BC and smart contracts for agreements and resource trading for NV, 95% engage regular BC architecture, Proof-of-Work (PoW) and Practical Byzantine Fault Tolerance (PBFT) being the most frequently used consensus, 80% engage the overlay network concept, and it has been engaged abundantly (27.5%) in 5G networks. Finally, we deliberate the possibilities and obstacles of the framework of blockchain-established NV and then provide suggestions to suppress them.

References (111)

  1. C.H. Wang, Y.H. Chu, and T.T. Wei, "SIPTVMON: a secure multicast overlay network for load-balancing and stable IPTV service using SIP," in 2011 IEEE INFOCOM WKSHPS, 2011, pp. 97-102.
  2. W. Kellerer, A. Basta, P. Babarczi, A. Blenk, M. He, M. Klugel, and A.M. Alba, "How to measure network flexibility? A proposal for evaluating softwarized networks," IEEE Communications Magazine, Vol. 56, No. 10, pp.186-192, 2018
  3. H.B. Lim, M. Iqbal, and T.J. Ng, "A virtualization framework for heterogeneous sensor network platforms," in 7th ACM Conference on Embedded Networked Sensor Systems, 2009, pp. 319-320.
  4. M.M. Hasan, H. Amarasinghe, and A. Karmouch, "Network virtualization: Dealing with multiple infrastructure providers," in 2012 IEEE ICC, 2012, pp. 5890-5895.
  5. L. Cano, A. Capone, G. Carello, M. Cesana, and M. Passacantando, "On optimal infrastructure sharing strategies in mobile radio networks," IEEE Transactions on Wireless Communications, Vol. 16, No. 5, pp.3003-3016, 2017
  6. N. Kitsuwan, K. Akaki, P. Pavarangkoon, and A. Nag, "Spectrum allocation scheme considering spectrum slicing in elastic optical networks," Journal of Optical Communications and Networking, Vol. 13, No. 7, pp.169- 181, 2021
  7. P.A.D.S.N. Wijesekara, and S. Gunawardena, "A Machine Learning-Aided Network Contention-Aware Link Lifetime-and Delay-Based Hybrid Routing Framework for Software-Defined Vehicular Networks," Telecom, Vol. 4, No. 3, pp. 393-458, 2023.
  8. M. Bhandary, M. Parmar, and D. Ambawade, "A blockchain solution based on directed acyclic graph for IoT data security using IoTA tangle," in 2020 5th ICCES, 2020, pp. 827-832.
  9. P.A.D.S.N. Wijesekara, "A Literature Review on Access Control in Networking Employing Blockchain," Indonesian Journal of Computer Science, Vol. 13, No. 1, pp. 734-768, 2024.
  10. Y. Li, Y. Yu, C. Lou, N. Guizani, and L. Wang, "Decentralized public key infrastructures atop blockchain," IEEE Network, Vol. 34, No. 6, pp.133-139, 2020
  11. M. Wang, M. Duan, and J. Zhu, "Research on the security criteria of hash functions in the blockchain," in Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, pp. 47-55, 2018.
  12. P.A.D.S.N. Wijesekara, "A Review of Blockchain- Rooted Energy Administration in Networking," Indonesian Journal of Computer Science, Vol. 13, No. 2, pp. 1607-1642, 2024.
  13. Z.M. Khalid, and S. Askar, "Resistant Blockchain cryptography to quantum computing attacks," International Journal of Science and Business, Vol. 5, No. 3, pp.116-125, 2021.
  14. P.A.D.S.N. Wijesekara, and S. Gunawardena, "A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges," Network, Vol. 3, No. 3, pp. 343-421, 2023.
  15. T. Hewa, P. Porambage, I. Kovacevic, N. Weerasinghe, E. Harjula, M. Liyanage, and M. Ylianttila, "Blockchain- based network slice broker to facilitate factory-as-a-service," IEEE Transactions on Industrial Informatics, Vol. 19, No. 1, pp.519-530, 2022
  16. G.A.F. Rebello, G.F. Camilo, L.G. Silva, L.C. Guimarães, L.A.C. de Souza, I.D. Alvarenga, and O.C.M. Duarte, "Providing a sliced, secure, and isolated software infrastructure of virtual functions through blockchain technology," in 2019 IEEE 20th International Conference on HPSR, 2019, pp. 1-6.
  17. X. Fan, and Y. Huo, "Blockchain based dynamic spectrum access of non-real-time data in cyber-physical- social systems," IEEE Access, Vol. 8, pp.64486-64498, 2020.
  18. D.B. Rawat, "Fusion of software defined networking, edge computing, and blockchain technology for wireless network virtualization," IEEE Communications Magazine, Vol. 57, No. 10, pp.50-55, 2019.
  19. H. Cao, Y. Hu, Q. Wang, S. Wu, and L. Yang, "A blockchain-based virtual network embedding algorithm for secure software defined networking," in IEEE INFOCOM 2020, 2020, pp.1057-1062.
  20. F. Patel, P. Bhattacharya, S. Tanwar, R. Gupta, N. Kumar, and M. Guizani, "Block6Tel: Blockchain-based spectrum allocation scheme in 6G-envisioned communications," in 2021 IWCMC, 2021, pp. 1823-1828.
  21. S. Zheng, T. Han, Y. Jiang, and X. Ge, "Smart contract- based spectrum sharing transactions for multi-operators wireless communication networks," IEEE Access, Vol. 8, pp.88547-88557, 2020 .
  22. H. Zhang, S. Leng, and H. Chai, "A blockchain enhanced dynamic spectrum sharing model based on proof-of- strategy," in IEEE ICC 2020, 2020, pp. 1-6.
  23. H. Zhang, S. Leng, F. Wu, and H. Chai, "A DAG blockchain-enhanced spectrum sharing framework for 6G-enabled IoT," IEEE Internet of Things Journal, Vol. 9, No. 11, pp.8012-8023, 2021 .
  24. N. Zhao, H. Wu, and X. Zhao, "Consortium blockchain- based secure software defined vehicular network," Mobile Networks and Applications, Vol. 25, pp.314-327, 2020 .
  25. R. Trabelsi, G. Fersi, and M. Jmaiel, "Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT Networks," in International Conference on Risks and Security of Internet and Systems, 2022, pp. 207-222.
  26. P.A.D.S.N. Wijesekara, "A study in University of Ruhuna for investigating prevalence, risk factors and remedies for psychiatric illnesses among students," Scientific Reports, Vol. 12, No. 1, pp. 12763, 2022.
  27. P.A.D.S.N. Wijesekara, and Y.K. Wang, "A Mathematical Epidemiological Model (SEQIJRDS) to Recommend Public Health Interventions Related to COVID- 19 in Sri Lanka," COVID, Vol. 2, No. 6, pp. 793-826, 2022.
  28. L. Zichao, H. Ziwei, Z. Geng, and M. Yan, "Ethernet topology discovery for virtual local area networks with incomplete information," in 2014 4th IEEE International Conference on Network Infrastructure and Digital Content, 2014, pp. 252-256.
  29. A. Mehdizadeha, K. Suinggia, M. Mohammadpoorb, and H. Haruna, "Virtual Local Area Network (VLAN): Segmentation and Security," in third ICCTIM2017, 2017, Vol. 78, p. 89.
  30. E. Ramadhani, "Anonymity communication VPN and Tor: a comparative study," Journal of Physics: Conference Series, Vol. 983, No. 1, p. 012060, 2018
  31. P. Knight, and C. Lewis, "Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts," IEEE Communications Magazine, Vol. 42, No. 6, pp.124-131, 2004.
  32. T. Lavian, and P.Y. Wang, "Active networking on a programmable networking platform," in 2001 IEEE OPENARCH, 2001, pp. 95-103.
  33. G. Coulson, G. Blair, D. Hutchison, A. Joolia, K. Lee, J. Ueyama, A. Gomes, and Y. Ye, "NETKIT: a software component-based approach to programmable networking," ACM SIGCOMM Computer Communication Review, Vol. 33, No. 5, pp.55-66, 2003.
  34. M. Nkomo, G.P. Hancke, A.M. Abu-Mahfouz, S. Sinha, and A.J. Onumanyi, "Overlay virtualized wireless sensor networks for application in industrial internet of things: A review," Sensors, Vol. 18, No. 10, p.3215, 2018.
  35. S. Guenender, K. Barabash, Y. Ben-Itzhak, A. Levin, E. Raichstein, and L. Schour, "NoEncap: overlay network virtualization with no encapsulation overheads," in 1st ACM SIGCOMM Symposium on Software Defined Networking Research, 2015, pp. 1-7.
  36. M. Alaluna, N. Neves, and F.M. Ramos, "Elastic network virtualization," in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 814-823, 2020.
  37. N. Shahriar, S. Taeb, S.R. Chowdhury, M. Tornatore, R. Boutaba, J. Mitra, and M. Hemmati, "Achieving a fully- flexible virtual network embedding in elastic optical networks," in IEEE INFOCOM 2019, 2019, pp. 1756-1764.
  38. N. Raveendran, Y. Gu, C. Jiang, N.H. Tran, M. Pan, L. Song, and Z. Han, "Cyclic three-sided matching game inspired wireless network virtualization," IEEE Transactions on Mobile Computing, Vol. 20, No. 2, pp.416-428, 2019.
  39. S.A. Kazmi, A. Ndikumana, A. Manzoor, W. Saad, and C.S. Hong, "Distributed radio slice allocation in wireless network virtualization: Matching theory meets auctions," IEEE Access, Vol. 8, pp.73494-73507, 2020.
  40. A. El Amri, and A. Meddeb, "Optimal server selection for competitive service providers in network virtualization context," Telecommunication Systems, Vol. 77, pp. 451-467, 2021.
  41. D.B. Rawat, A. Alshaikhi, A. Alshammari, C. Bajracharya, and M. Song, "Payoff optimization through wireless network virtualization for IoT applications: A three layer game approach," IEEE Internet of Things Journal, Vol. 6, No. 2, pp.2797-2805, 2018.
  42. P.A.D.S.N. Wijesekara, K.L.K. Sudheera, G.G.N. Sandamali, and P.H.J. Chong, "An Optimization Framework for Data Collection in Software Defined Vehicular Networks," Sensors, Vol. 23, No. 3, pp. 1600, 2023.
  43. L. Lewin-Eytan, K. Barabash, R. Cohen, V. Jain, and A. Levin, "Designing modular overlay solutions for network virtualization," IBM Technical Paper, IBM Research Division, Haifa Research Laboratory, Mt. Carmel 31905, Haifa, Israel, 2012.
  44. Y. Cui, P. Wu, M. Xu, J. Wu, Y.L. Lee, A. Durand, and C. Metz, "4over6: network layer virtualization for IPv4-IPv6 coexistence," IEEE Network, Vol. 26, No. 5, pp.44-48, 2012.
  45. M. Bacou, G. Todeschi, D. Hagimont, and A. Tchana, "Nested virtualization without the nest," in 48th International Conference on Parallel Processing, 2019, pp. 1-10.
  46. M. El Barachi, N. Kara, and R. Dssouli, "Towards a service-oriented network virtualization architecture," in 2010 ITU-T Kaleidoscope: Beyond the Internet?-Innovations for Future Networks and Services, 2010, pp. 1-7.
  47. H. Lu, and F. Zhang, "Resource fragmentation-aware embedding in dynamic network virtualization environments," IEEE Transactions on Network and Service Management, Vol. 19, No. 2, pp.936-948, 2022.
  48. C. Seneviratne, P.A.D.S.N. Wijesekara, and H. Leung, "Performance analysis of distributed estimation for data fusion using a statistical approach in smart grid noisy wireless sensor networks," Sensors, Vol. 20, No. 2, pp. 567, 2020.
  49. Y. Dong, X. Zhang, J. Dai, and H. Guan, "HYVI: a hybrid virtualization solution balancing performance and manageability," IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 9, pp.2332-2341, 2013.
  50. J. Kwon, T. Lee, C. Hähni, and A. Perrig, "SVLAN: Secure & scalable network virtualization," in NDSS 2020, 2020, Vol. 1, 2020, pp. 498-512.
  51. R. Sherwood, G. Gibb, K.K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar, "Flowvisor: A network virtualization layer," OpenFlow Switch Consortium, Tech. Rep, 1, p.132, 2009.
  52. K. Yamada, Y. Kanada, K. Amemiya, A. Nakao, and Y. Saida, "VNode infrastucture enhancement-Deeply programmable network virtualization," in 2015 21 st APCC, 2015, pp. 244-249.
  53. P.A.D.S.N. Wijesekara, "Deep 3D Dynamic Object Detection towards Successful and Safe Navigation for Full Autonomous Driving," Open Transportation Journal, Vol. 16, No. 1, pp. e187444782208191, 2022.
  54. X. Li, R. Casellas, G. Landi, A. de la Oliva, X. Costa- Perez, A. Garcia-Saavedra, T. Deiss, L. Cominardi, and R. Vilalta, "5G-crosshaul network slicing: Enabling multi- tenancy in mobile transport networks," IEEE Communications Magazine, Vol. 55, No. 8, pp.128-137, 2017.
  55. Ahmadi, H., Macaluso, I., Gomez, I., DaSilva, L. and Doyle, L., 2016, December. Virtualization of spatial streams for enhanced spectrum sharing. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.
  56. A.J. Morgado, F.B. Saghezchi, S. Mumtaz, V. Frascolla, J. Rodriguez, and I. Otung, "A novel machine learning-based scheme for spectrum sharing in virtualized 5g networks," IEEE Transactions on Intelligent Transportation Systems, Vol. 23, No. 10, pp.19691-19703, 2022.
  57. C. Liang, and F.R. Yu, "Wireless virtualization for next generation mobile cellular networks," IEEE wireless communications, Vol. 22, No. 1, pp.61-69, 2015.
  58. A. Cárdenas, D. Fernández, C.M. Lentisco, R.F. Moyano, and L. Bellido, "Enhancing a 5G network slicing management model to improve the support of mobile virtual network operators," IEEE Access, Vol. 9, pp.131382-131399, 2021.
  59. R. Nejbati, S. Azodolmolky, and D. Simeonidou, "Role of network virtualization in future Internet innovation," in 2012 17th European Conference on Networks and Optical Communications, 2012, pp. 1-4.
  60. J. Navarro-Ortiz, O. Sallent, and J. Pérez-Romero, "Radio access network slicing strategies at spectrum planning level in 5G and beyond," IEEE access, Vol. 8, pp.79604- 79618, 2020.
  61. J.V. Ramrao, and A. Jain, "Dynamic 5G network slicing," International Journal of Advanced Trends in Computer Science and Engineering, Vol. 10, No. 2, pp. 1006- 1010, 2021.
  62. D. Zhang, Z. Chang, T. Hämäläinen, and F.R. Yu, "Double auction based multi-flow transmission in software- defined and virtualized wireless networks," IEEE Transactions on Wireless Communications, Vol. 16, No. 12, pp.8390-8404, 2017.
  63. Y. Wang, L. Nguyen, and Q. Hu, "Network Function Virtualization in Elastic Optical Networks," Journal of Lightwave Technology, Vol. 41, No. 16, pp.5183-5192, 2023.
  64. P.A.D.S.N. Wijesekara, K.L.K. Sudheera, G.G.N. Sandamali, and P.H.J. Chong, "Machine Learning Based Link Stability Prediction for Routing in Software Defined Vehicular Networks," in 20th Academic Sessions, p.60, 2023.
  65. R.S. Alonso, I. Sittón-Candanedo, R. Casado-Vara, J. Prieto, and J.M. Corchado, "Deep reinforcement learning for the management of software-defined networks and network function virtualization in an edge-IoT architecture," Sustainability, Vol. 12, No. 14, p.5706, 2020.
  66. M. Gharbaoui, et al., "An experimental study on latency- aware and self-adaptive service chaining orchestration in distributed NFV and SDN infrastructures," Computer Networks, Vol. 208, p.108880, 2022.
  67. P.A.D.S.N. Wijesekara, "A Review on Deploying Blockchain Technology for Network Mobility Management," International Transactions on Electrical Engineering and Computer Science, Vol. 3, No. 1, pp. 1-33, 2024.
  68. W. Li, H. Guo, M. Nejad, and C.C. Shen, "Privacy- preserving traffic management: A blockchain and zero- knowledge proof inspired approach," IEEE access, Vol. 8, pp.181733-181743, 2020.
  69. P.A.D.S.N. Wijesekara, "Ethical Knowledge Sharing Leveraging Blockchain: An Overview," Science, Engineering, and Technology, Vol. 4, No. 1, pp.112-136, 2024.
  70. Z. Zhou, X. Chen, Y. Zhang, and S. Mumtaz, "Blockchain-empowered secure spectrum sharing for 5G heterogeneous networks," IEEE Network, Vol. 34, No. 1, pp.24-31, 2020.
  71. M. Patnaik, G. Prabhu, C. Rebeiro, V. Matyas, and K. Veezhinathan, "ProBLeSS: A proactive blockchain based spectrum sharing protocol against SSDF attacks in cognitive radio IoBT networks," IEEE Networking Letters, Vol. 2, No. 2, pp.67-70, 2020.
  72. Y. Choi, and I.G. Lee, "Game theoretical approach of blockchain-based spectrum sharing for 5G-enabled IoTs in dense networks," in 2019 IEEE 90 th VTC2019-Fall, 2019, pp. 1-6.
  73. K. Zhu, L. Huang, J. Nie, Y. Zhang, Z. Xiong, H.N. Dai, and J. Jin, "Privacy-aware double auction with time- dependent valuation for blockchain-based dynamic spectrum sharing in IoT systems," IEEE Internet of Things Journal, Vol. 10, No. 8, pp. 6756-6768, 2022.
  74. Z. Li, W. Wang, Q. Wu, and X. Wang, "Multi-operator dynamic spectrum sharing for wireless communications: a consortium blockchain enabled framework," IEEE Transactions on Cognitive Communications and Networking, Vol. 9, No. 1, pp.3-15, 2022.
  75. B. Mafakheri, T. Subramanya, L. Goratti, and R. Riggio, "Blockchain-based infrastructure sharing in 5G small cell networks," in 2018 14th International CNSM, 2018, pp.313- 317.
  76. T. Faisal, M. Dohler, S. Mangiante, and D.R. Lopez, "BEAT: Blockchain-Enabled Accountable and Transparent Infrastructure Sharing in 6G and Beyond," IEEE Access, Vol. 10, pp.48660-48672, 2022.
  77. M. Samaniego, and R. Deters, "Hosting virtual iot resources on edge-hosts with blockchain," in 2016 IEEE International conference on CIT, 2016, pp.116-119. IEEE.
  78. Y. Lin, J. Kang, D. Niyato, Z. Gao, and Q. Wang, "Efficient Consensus and Elastic Resource Allocation Empowered Blockchain for Vehicular Networks," IEEE Transactions on Vehicular Technology, Vol. 72, No. 4, pp.5513-5517,
  79. L. Xue, W. Yang, W. Chen, and L. Huang, "STBC: A novel blockchain-based spectrum trading solution," IEEE Transactions on Cognitive Communications and Networking, Vol. 8, No. 1, pp.13-30, 2021.
  80. S. Ding, G. Shen, K.X. Pan, S.K. Bose, Q. Zhang, and B. Mukherjee, "Blockchain-assisted spectrum trading between elastic virtual optical networks," IEEE Network, Vol. 34, No. 6, pp.205-211, 2020.
  81. M. Jiang, Y. Li, Q. Zhang, G. Zhang, and J. Qin, "Decentralized blockchain-based dynamic spectrum acquisition for wireless downlink communications," IEEE Transactions on Signal Processing, Vol. 69, pp.986-997, 2021.
  82. G.O. Boateng, D. Ayepah-Mensah, D.M. Doe, A. Mohammed, G. Sun, and G. Liu, "Blockchain-enabled resource trading and deep reinforcement learning-based autonomous RAN slicing in 5G," IEEE Transactions on Network and Service Management, Vol. 19, No. 1, pp.216- 227, 2021.
  83. M.A. Togou et al., "DBNS: A distributed blockchain- enabled network slicing framework for 5G networks," IEEE Communications Magazine, Vol. 58, No. 11, pp.90-96, 2020.
  84. L. Zanzi, A. Albanese, V. Sciancalepore, and X. Costa- Pérez, "NSBchain: A secure blockchain framework for network slicing brokerage," in IEEE ICC 2020, 2020, pp.1-7.
  85. G.O. Boateng, G. Sun, D.A. Mensah, D.M. Doe, R. Ou, and G. Liu, "Consortium blockchain-based spectrum trading for network slicing in 5G RAN: A multi-agent deep reinforcement learning approach," IEEE Transactions on Mobile Computing, Vol. 22, No. 10, pp.5801 -5815, 2022.
  86. S. Singh, C.R. Babu, K. Ramana, I.H. Ra, and B. Yoon, "BENS-B5G: blockchain-enabled network slicing in 5G and beyond-5G (B5G) networks," Sensors, Vol. 22, No. 16, p.6068, 2022.
  87. V. Theodorou et al., "Blockchain-based zero touch service assurance in cross-domain network slicing," in 2021 Joint EuCNC/6G Summit, 2021, pp.395-400.
  88. P. Gorla, V. Chamola, V. Hassija, and D. Niyato, "Network slicing for 5G with UE state based allocation and blockchain approach," IEEE Network, Vol. 35, No. 3, pp.184- 190, 2020.
  89. K. Xiao, Z. Geng, Y. He, G. Xu, C. Wang, and Y. Tian, "A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme," EURASIP Journal on Wireless Communications and Networking, Vol. 2021, No. 1, p.165, 2021.
  90. I.H. Abdulqadder, and S. Zhou, "SliceBlock: context- aware authentication handover and secure network slicing using DAG-blockchain in edge-assisted SDN/NFV-6G environment," IEEE Internet of Things Journal, Vol. 9, No. 18, pp.18079-18097, 2022.
  91. X. Fu, F.R. Yu, J. Wang, Q. Qi, and J. Liao, "Performance optimization for blockchain-enabled distributed network function virtualization management and orchestration," IEEE Transactions on Vehicular Technology, Vol. 69, No. 6, pp.6670-6679, 2020.
  92. M.S. Rahman, I. Khalil, and M. Atiquzzaman, "Blockchain-enabled SLA compliance for crowdsourced edge-based network function virtualization," IEEE Network, Vol. 35, No. 5, pp.58-65, 2021.
  93. X. Fu, F.R. Yu, J. Wang, Q. Qi, and J. Liao, "Resource allocation for blockchain-enabled distributed network function virtualization (NFV) with mobile edge cloud (MEC)," in IEEE INFOCOM 2019, 2019, pp. 1-6.
  94. H.A. Jawdhari, and A.A. Abdullah, "A novel blockchain architecture based on network functions virtualization (NFV) with auto smart contracts," Periodicals of Engineering and Natural Sciences, Vol. 9, No. 4, pp.834-844, 2021.
  95. M.F. Franco, E.J. Scheid, L.Z. Granville, and B. Stiller, "BRAIN: Blockchain-based reverse auction for infrastructure supply in virtual network functions-as-a-service," in 2019 IFIP Networking Conference, 2019, pp. 1-9.
  96. H. Huang, W. Miao, G. Min, J. Tian, and A. Alamri, "NFV and blockchain enabled 5G for ultra-reliable and low- latency communications in industry: Architecture and performance evaluation," IEEE Transactions on Industrial Informatics, Vol. 17, No. 8, pp.5595-5604, 2020.
  97. I.D. Alvarenga, G.A. Rebello, and O.C.M. Duarte, "Securing configuration management and migration of virtual network functions using blockchain," in NOMS 2018, 2018, pp. 1-9.
  98. L. Sun, "Service Chaining Security Based on Blockchain," in Journal of Physics: Conference Series, Vol. 1634, No. 1, p. 012031, 2020.
  99. P.A.D.S.N. Wijesekara, W.M.A.K. Sangeeth, H.S.C. Perera, and N.D. Jayasundere, "Underwater Acoustic Digital Communication Channel for an UROV," in 5th Annual Research Symposium (ARS2018), p. E17, 2018.
  100. M.U. Hassan, M.H. Rehmani, and J. Chen, "Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions," Future Generation Computer Systems, Vol. 97, pp.512-529, 2019.
  101. P.A.D.S.N. Wijesekara, K.L.K. Sudheera, G.G.N. Sandamali, and P.H.J. Chong, "Data Gathering Optimization in Hybrid Software Defined Vehicular Networks," in 20th Academic Sessions, p. 59, 2023.
  102. I. Afolabi, M. Bagaa, T. Taleb, and H. Flinck, "End-to- end network slicing enabled through network function virtualization, in 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp. 30-35, 2017.
  103. P.A.D.S.N. Wijesekara, and S. Gunawardena, "A Comprehensive Survey on Knowledge-Defined Networking," Telecom, Vol. 4, No. 3, pp. 477-596, 2023.
  104. P. Chithaluru, F. Al-Turjman, T. Stephan, M. Kumar, and L. Mostarda, "Energy-efficient blockchain implementation for cognitive wireless communication networks (CWCNs)," Energy Reports, Vol. 7, pp.8277-8286, 2021.
  105. J. Xie, K. Zhang, Y. Lu, and Y. Zhang, "Resource- efficient DAG blockchain with sharding for 6G networks," Ieee Network, Vol. 36, No. 1, pp.189-196, 2021.
  106. H. Wu, K. Wolter, P. Jiao, Y. Deng, Y. Zhao, and M. Xu, "EEDTO: An energy-efficient dynamic task offloading algorithm for blockchain-enabled IoT-edge-cloud orchestrated computing," IEEE Internet of Things Journal, Vol. 8, No. 4, pp.2163-2176, 2020.
  107. S. De Angelis, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, and V. Sassone, "PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain," in CEUR workshop proceedings, Vol. 2058, 2018.
  108. H.M.D.P.M. Herath, W.A.S.A. Weraniyagoda, R.T.M. Rajapaksha, P.A.D.S.N. Wijesekara, K.L.K. Sudheera, and P.H.J. Chong, "Automatic Assessment of Aphasic Speech Sensed by Audio Sensors for Classification into Aphasia Severity Levels to Recommend Speech Therapies," Sensors, Vol. 22, No. 18, pp. 6966, 2022.
  109. F.A. Aponte-Novoa, A.L.S. Orozco, R. Villanueva- Polanco, and P. Wightman, "The 51% attack on blockchains: A mining behavior study," IEEE access, Vol. 9, pp.140549- 140564, 2021.
  110. Y. Li, L.T.X. Phan, and B.T. Loo, "Network functions virtualization with soft real-time guarantees," in IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pp. 1-9, 2016.
  111. H.A. Jawdhari, and A.A. Abdullah, "The application of network functions virtualization on different networks, and its new applications in blockchain: A survey," Management, Vol. 18, pp. 1007-1044, 2021.