]>

On Exploiting Blockchain Technology to Approach toward Secured, Sliced and Edge Deployed Virtual Network Functions for Improvised IoT Services

Chapter 14

On Exploiting Blockchain Technology to Approach toward Secured, Sliced and Edge Deployed Virtual Network Functions for Improvised IoT Services

Mahzabeen Emu and Salimur Choudhury

Lakehead University, Canada

CONTENTS

14.1 Introduction

14.2 Literature Review

14.3 Blockchain-Powered Secured Slicing

14.4 The Blockchain-Inspired Architecture for Network Slicing

14.5 The Hyperledger Fabric-Driven Prototype

14.6 Conclusion

References

14.1 Introduction

The era of Software-Defined Networking (SDN) has encouraged the transition from a hardware-dependent network system to virtualized services ...

Get Secure Edge Computing now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.