16 research outputs found

    Blockchain-over-optical networks: a trusted virtual network function (VNF) management proposition for 5G optical networks

    No full text
    Abstract In this paper, we discuss the security issues revolving around the management of VNFs in 5G optical networks; and present a high-level view of work-in-progress by leveraging a Blockchain-over-optical network to mitigate these issues

    Privacy protected blockchain-based architecture and implementation for sharing of students’ credentials

    No full text
    Abstract Sharing of students’ credentials is a necessary and integral process of an education ecosystem that comprises various stakeholders like students, schools, companies, professors and the governmental authorities. As of today, all these stakeholders have to put-in an enormous amount of efforts to ensure the authenticity and privacy of students’ credentials. Despite these efforts, the process of sharing students’ credentials is complex, error-prone and not completely secure. Our aim is to leverage blockchain technology to mitigate the existing security-related issues concerning the sharing of students’ credentials. Thus, the paper proposes a tamper-proof, immutable, authentic, non-repudiable, privacy protected and easy to share blockchain-based architecture for secured sharing of students’ credentials. To increase the scalability, the proposed system uses a secure off-chain storage mechanism. The performance and viability of the proposed architecture is analyzed by using an Ethereum based prototypical implementation. The test results imply that requests can be executed within few seconds (without block-time) and the system has stability to process up to 1000 simultaneous requests

    Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G

    No full text
    Abstract The emergence of Multi-Access Edge Computing (MEC) technology aims to extend cloud computing capabilities to the edge of the wireless access networks, i.e., closer to the end-users. Thus, MEC-enabled 5G wireless systems are envisaged to offer real-time, low-latency, and high-bandwidth access to the radio network resources. Thus, MEC allows network operators to open up their networks to a wide range of innovative services, thereby giving rise to a brand-new ecosystem and a value chain. Furthermore, MEC as an enabling technology will provide new insights into coherent integration of Internet of Things (IoT) in 5G wireless systems. In this context, this paper expounds the four key technologies, including Network Function Virtualization (NFV), Software Defined Networking (SDN), Network Slicing and Information Centric Networking (ICN), that will propel and intensify the integration of MEC IoT in 5G networks. Moreover, our goal is to provide the close alliance between MEC and these four driving technologies in the 5G IoT context and to identify the open challenges, future directions, and concrete integration paths

    How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?

    No full text
    Abstract Several recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is that it can be victimized by DoS (Denial of Service) attack. Thus, the aim of this work is three fold. First, to present the possible ways in which DoS/DDoS attacks can be mounted on NSB and their adverse effects. Second, to propose and implement initial blockchain-based solution named as Security Service Blockchain (SSB) to prevent DoS attacks on NSB. Third, to enumerate the challenges and future research directions to effectively utilize blockchain for mitigating DoS/DDoS attacks on NSB. To evaluate the performance the proposed SSB framework is implemented using Hyperledger Fabric. The results manifest that the latency impact of the legitimate slice creation over scaled up malicious traffic remains minimal with the use of SSB framework. The integration of SSB with NSB results in gaining several fold reduction in latency under DoS attack scenario

    Blockchain for 5G and IoT:opportunities and challenges

    No full text
    Abstract Hitherto, the evolution of mobile networks have fulfilled the increasing demands for enhanced performance, availability, portability, elasticity, and energy efficiency posed by the ever growing network services. In line with the progression, 5G depicts the next generation of mobile networks that further promises remarkable performance improvements as well as creation of new value chain. In parallel to 5G, the Internet of Things (IoT) has emerged as another new paradigm for interconnection of massive communication-capable heterogeneous smart objects. 5G is envisaged to broaden IoT’s scope and fields of applicability. However, since current mobile networks and also more general IoT systems are based on centralized models thus it is anticipated that they will face tremendous challenges to meet-up the requirements of future 5G-enabled-IoT use cases. To solve these inevitable issues Blockchain stands out as promising technology. Some of the offerings of Blockchain technology are immutability, non-repudiation, proof of provenance, integrity, privacy, etc. Blockchain’s combination with 5G and IoT still requires essential insights with respect to concrete application domains, scalability, privacy issues, performance, and potential financial benefits. The paper aims to elaborate and emphasize the key aspects of the use of Blockchain for 5G and IoT

    Implementation and analysis of blockchain based DApp for secure sharing of students’ credentials

    No full text
    Abstract The paper aims to resolve security issues revolving around the sharing of students’ credentials by leveraging the blockchain technology. It proposes a novel blockchain-based architecture followed by its implementation as a decentralized application (DApp). Further, the cost & the performance analysis are carried out based on the experiments conducted

    B-VNF:blockchain-enhanced architecture for VNF orchestration in MEC-5G networks

    No full text
    Abstract The roll-out of 5G technology will nurture the realization of broadband, ultra-reliable, and zero latency services. Network Function Virtualization (NFV) and Multi-Access Edge Computing (MEC) are among the key enablers for 5G. The synergy between NFV and MEC allows migration of Virtual Network Functions (VNF) from cloud to the edge of the network thereby adding agility to the softwarized 5G networks. The overall orchestration of VNF includes, but is not limited to, processing VNF requests, selecting appropriate VNF, migrating VNF from cloud to MEC, instantiating migrated VNF at MEC, settling payment according to a VNF’s usage, maintaining VNF’s reputation, etc. The orchestration is not foolproof and raises doubts about its trustworthiness. To address all the existing issues in a unified manner, we leverage Blockchain technology as yet another enabling technology for MEC-enabled 5G. Thus, we propose a Blockchain-enhanced architecture for secure VNF orchestration such that issues like authenticity, integrity, confidentiality, reputation, payment transfer, and many more are resolved. To furnish a Proof-of-Concept (PoC), we develop a prototypical DApp (Decentralized Application) using Ethereum Blockchain and Suricata as an exemplar VNF. Further, we discuss the strong resiliency of the proposed architecture against numerous well-known attacks

    The role of blockchain to fight against COVID-19

    Get PDF
    Abstract The COVID-19 pandemic has adversely affected almost all aspects of human life, various sectors of business, and regions of the world. The flow of human activities halted for several months, and are now being carefully redefined to align with guidelines and recommendations to avoid the spread of the novel coronavirus. In contrast to other pandemics the world has witnessed in the past, the technological advancements of the current era are a boon that can play a key role in safeguarding humanity. In this work, we begin by highlighting general challenges that have arisen during the COVID-19 pandemic. Next, to gauge the applicability of blockchain as a key enabling technology, we identify potential use cases to meet current needs. Furthermore, for each use case, we present a high-level view of how blockchain can be leveraged and discuss the expected performance. Finally, we highlight the challenges that must be addressed to harness the full potential of blockchain technology and discuss plausible solutions

    A survey on blockchain in robotics:issues, opportunities, challenges and future directions

    No full text
    Abstract Robotics is the multi-disciplinary domain that is booming in today’s world, and expanding its roots deep into various fields of research, manufacturing industries, healthcare, and even in our day-to-day lives. Nevertheless, as with any other evolving technology, robotics face numerous challenges. In this context, lately, blockchain technology has been identified as a promising technology to resolve many of these issues such as identification of malicious/rogue nodes, malfunctioning/faults in automated processes, non-compliance to the agreed norms and privacy rules, security attacks on robotic systems, and non-transparency in performance monitoring and audits. In particular, blockchain with its features like decentrality, immutability, provenance, low operational cost, tight access control, and trustworthy operations, can offer significant improvements to new applications and use cases driven by robotics. Thus, the paper begins with exploring the key requirements and technical challenges encountered by robots in general. Next, it provides detailed overview of blockchain technology in a tutorial style. Then, the role of blockchain for different uses cases of robotics are surveyed. Furthermore, various technical challenges that need to be mitigated to harness full potential of blockchain for robotics are highlighted. Finally, the future research directions are presented that can pave the way ahead for advancements and profitable integration of blockchain in the realm of robotics.

    A novel authentication mechanism for mobile satellite communication systems

    No full text
    Abstract The authentication protocols existing in the realm of mobile satellite communication networks, usually employ the one-time shared secret technique. Although the technique combats well against replay attacks, however, it is vulnerable to desynchronisation attacks. The later type of attacks, if framed and mounted against the crucial update mechanisms, which occur in mobile satellite communication systems, can lead to permanent Denial of Service (DoS) conditions. In this context, the authentication protocol initially proposed by Lee et al. [1] Has emerged as the defacto protocol and forms the basis for various other authentication protocols developed since then. In this paper our contribution is two-fold. The first part of the paper presents an analysis of the authentication protocol [1], which reveals that the protocol is fundamentally susceptible to two attacks: impersonation attack and desynchronisation attack. To overcome these susceptibilities, in the second part of the paper, a new authentication protocol is proposed which incorporates a resynchronization phase. The paper demonstrates that the proposed solution is robust to impersonation attacks as well as to permanent DoS conditions caused by desynchronisation attacks. Moreover, the proposed solution is expected to find its application to address the desynchronisation issue found in numerous other recently published enhanced authentication protocols
    corecore