Chapter 14

On Exploiting Blockchain Technology to Approach toward Secured, Sliced and Edge Deployed Virtual Network Functions for Improvised IoT Services

Mahzabeen Emu and Salimur Choudhury

Lakehead University, Canada

CONTENTS

14.1 Introduction

14.2 Literature Review

14.3 Blockchain-Powered Secured Slicing

14.4 The Blockchain-Inspired Architecture for Network Slicing

14.5 The Hyperledger Fabric-Driven Prototype

14.6 Conclusion

References

14.1 Introduction

The era of Software-Defined Networking (SDN) has encouraged the transition from a hardware-dependent network system to virtualized services that has been a revolutionary step in telecommunications. Network Functions Virtualization (NFV) [2] is an architecture where the communication services ...

Get Secure Edge Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.