Chapter 14
On Exploiting Blockchain Technology to Approach toward Secured, Sliced and Edge Deployed Virtual Network Functions for Improvised IoT Services
CONTENTS
14.3 Blockchain-Powered Secured Slicing
14.4 The Blockchain-Inspired Architecture for Network Slicing
14.1 Introduction
The era of Software-Defined Networking (SDN) has encouraged the transition from a hardware-dependent network system to virtualized services that has been a revolutionary step in telecommunications. Network Functions Virtualization (NFV) [2] is an architecture where the communication services ...
Get Secure Edge Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.