References
- Alemany, P., Vilalta, R., Muñoz, R., Casellas, R., R. Maríinez. (2020) Peer-to-Peer Blockchain-based NFV Service Platform for End-to-End Network Slice Orchestration Across Multiple NFVI Domains. In: 2020 IEEE 3rd 5G World Forum (5GWF), 2020, 151–156. Bangalore, India: IEEE.
- Attaoui, W., Sabir, E., Elbiaze, H., Guizani, M. (2023) VNF and CNF Placement in 5G: Recent Advances and Future Trends. IEEE Transactions on Network and Service Management, 20(4), 4698–4733. DOI: 10.1109/TNSM.2023.3264005.
- Bala, R., Manoharan, R. (2022) Blockchain based Secure and Effective Authentication Mechanism for 5G Networks. In: 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), 2022, 1–6. Pune, India: IEEE.
- Benet, J. (2014) IPFS - Content Addressed, Versioned, P2P File System, ArXiv, 1407.3561.
- Bistarelli, S., Mazzante, G., Micheletti, M., Mostarda, L., Sestili, D., Tiezzi, F. (2020) Ethereum smart contracts: Analysis and statistics of their source code and opcodes. Internet of Things, 11, 2542–6605. DOI: 10.1016/j.iot.2020.100198.
- Dreibholz, T. (2020) A 4G/5G Packet Core as VNF with Open Source MANO and OpenAirInterface. In: 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2020, 1–3. Split, Croatia: IEEE.
- Haber, S., Stornetta, W.S. (1991) How to Time-Stamp a Digital Document. Journal of Cryptography, 3, 99–111. DOI: https://doi.org/10.1007/3-540-38424-3_32.
- Hung, Y. –M., Chien, S. -C., Hsu, Y. (2017) Orchestration of NFV virtual applications based on TOSCA data models. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2017, 219–222. Seoul, Korea (South): IEEE.
- Kapassa, E., Touloupos, M., Kyriazis, D., Themistocleous, M. (2020) A Smart Distributed Marketplace. In: Themistocleous, M., Papadaki, M. (eds) Information Systems. EMCIS 2019, Springer.
- Li, H and Kong, Zi and Chen, Y and Wang, L and Lu, Z and Wen, X and Jing, W and Xiang, W. (2023) Slice-Based Service Function Chain Embedding for End-to-End Network Slice Deployment. IEEE Transactions on Network and Service Management, 20(3), 3652–3672. DOI: 10.1109/TNSM.2023.3250719.
- Liu, J and Huang, C. –T. (2021) Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain. In: 2021 International Conference on Computer Communications and Networks (ICCCN), 2021, 1–6. Athens, Greece: IEEE.
- Madi, T., Alameddine, H –A., Pourzandi, M., Boukhtouta, A. (2021) NFV security survey in 5G networks: A three-dimensional threat taxonomy. Computer Networks, 197. DOI: 10.1016/j.comnet.2021.108288.
- Mishra, R., Kalla, A., Shukla, K., Nag, A., Liyanage, M. (2020) B-VNF: Blockchain-enhanced Architecture for VNF Orchestration in MEC-5G Networks. In: 2020 IEEE 3rd 5G World Forum (5GWF), 2020, 229–234. Bangalore, India: IEEE.
- Mukherjee, P., Chittaranjan, P. (2021) Blockchain 1.0 to Blockchain 4.0—The Evolutionary Transformation of Blockchain Technology. Blockchain Technology: Applications and Challenges, 203, 29–49. DOI: 10.1007/978-3-030-69395-4_3.
- Nguyen, T. -H., Yoo, M. (2018) A VNF Descriptor Generator for Tacker-based NFV Management and Orchestration. In: 2018 International Conference on Information and Communication Technology Convergence (ICTC), 2018, 260–262. Jeju, Korea (South): IEEE.
- Patel, W., Tripathy, P. (2023) eMBB, URLLC, and mMTC 5G Wireless Network Slicing: A Communication-Theoretic View. In: 2023 International Conference on Artificial Intelligence and Smart Communication, 2023, 1291–1296. Greater Noida, India: IEEE.
- Scheid, E.J., Keller, M., Franco, M.F., Stiller, B. (2019) BUNKER: A Blockchain-based trUsted VNF pacKagE Repository. In: International Conference on the Economics of Grids, Clouds, Systems, and Services GECON 2019, 188–196. Springer.
- Taherdoost, H. (2023) Smart Contracts in Blockchain Technology: A Critical Review, Information, 14(2). DOI: 10.3390/info14020117.
- Zhang, Y., Deng, R. H., Bertino, E., Zheng, D. (2021) Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Transactions on Dependable and Secure Computing, 18(2), 858–874. DOI: 10.1109/TDSC.2019.2927664.