skip to main content
10.1145/3361821.3361838acmotherconferencesArticle/Chapter ViewAbstractPublication PagescciotConference Proceedingsconference-collections
research-article

Suitability of Blockchains to Enable and Support Networking Functions: State of Art

Published: 20 September 2019 Publication History

Abstract

The underlying network infrastructure faces challenges from addressing maintenance, security, performance, and scalability to make the network more reliable and stable. Software-defined networking, blockchain, and network function virtualization were proposed and realized to address such issues in both academic and industry wise. This paper analyzes and summarizes works from implementing different categories of blockchains as an element or enabler of network functions to resolve the limitation. Blockchain as a network function has been proposed to give support to the underlying network infrastructure to provide services that have less lag, are more cost-effective, have better performance, guarantee security between participating parties, and protect the privacy of the users. This paper provides a review of recent work that makes use of blockchain to address such networking related challenges and the possible setbacks in the proposal.

References

[1]
Aniruddh Rao Kabbinale, Emmanouil Dimogerontakis, Mennan Selimi, Anwaar Ali, Leandro Navarro, Arjuna Sathiaseelan, "Blockchain for Economically Sustainable Wireless Mesh Networks," 2018.
[2]
B. Kumar, and J. Crowcroft. "Integrating Security in Inter-Domain Routing Protocols" ACM Computer Commun. Review, pages 36--51, 1993.
[3]
Boudguiga Aymen, Bouzerna Nabil, Granboulan Louis, Olivereau Alexis, Quesnel Flavien, Roger Anthony, and Sirdey Renaud, "Towards Better Availability and Accountability for IoT Updates by means of a Blockchain," 2017
[4]
D. Mingxiao, M. Xiaofeng, Z. Zhe, W. Xiangwei and C. Qijun, "A review on consensus algorithm of blockchain," 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, 2017, pp. 2567--2572.
[5]
Das, Manik Lal, "Privacy and Security Challenges in Internet of Things," Distributed Computing and Internet Technology, 2015.
[6]
E Erdin, M Cebe, K Akkaya, S Solak, E Bulut, S Uluagac, "Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations," 2018
[7]
Giovanni Di Stasi, Stefano Alallone, Roberto Canonico, Giorgio Ventre, Routing Payments on the Lightning Network, Napoli, 2018.
[8]
Gudgeon, Lewis et al. "SoK: Off The Chain Transactions," IACR Cryptology ePrint Archive 2019
[9]
H. Sukhwani, J. M. Martínez, X. Chang, K. S. Trivedi, and A. Rindos, "Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)," 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, 2017, pp. 253--255.
[10]
H. Yang, H. Zheng, J. Zhang, Y. Wu, Y. Lee and Y. Ji, "Blockchain-based trusted authentication in cloud radio over fiber network for 5G," 2017 16th International Conference on Optical Communications and Networks (ICOCN), Wuzhen, 2017, pp. 1--3
[11]
Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D. and Wagner, D., "Smart locks: Lessons for securing commodity internet of things devices.," in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
[12]
Huh Seyoung, Cho Sangrae, and Kim Soohyung, "Managing IoT devices using blockchain platform," 2017
[13]
J. Backman, S. Yrjölä, K. Valtanen, and O. Mämmelä, "Blockchain network slice broker in 5G: Slice leasing in a factory of the future use case," 2017 Internet of Things Business Models, Users, and Networks, Copenhagen, 2017, pp. 1--8
[14]
J. Shao, R. Lu, X. Lin and C. Zuo, "New threshold anonymous authentication for VANETs," 2015 IEEE/CIC International Conference on Communications in China (ICCC), Shenzhen, 2015, pp. 1--6.
[15]
Jordi Herrera-Joancomartí et al. "On the Difficulty of Hiding the Balanceof Lightning Network Channels," IACR ePrint Archive 2019
[16]
Jourenko Maxim, Larangeira Mario, Kurazumi Kanta, and Tanaka Keisuke, "SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies," 2019
[17]
Jun Li, J. Stein, Mingwei Zhang, and O. Maennel, "An expectation-based approach to policy-based security of the Border Gateway Protocol," 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, 2016, pp. 340--345.
[18]
K. Christidis and M. Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things," in IEEE Access, vol. 4, pp. 2292--2303, 2016.
[19]
K. Kotobi and Sven G. Bilén, "Blockchain-enabled spectrum access in cognitive radio networks," 2017 Wireless Telecommunications Symposium (WTS), Chicago, IL, 2017, pp. 1--6.
[20]
K. Valtanen, J. Backman and S. Yrjölä, "Creating value through blockchain powered resource configurations: Analysis of 5G network slice brokering case," 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, 2018, pp. 185--190.
[21]
Kshetri Nir, "Can Blockchain Strengthen the Internet of Things?," IT Professional, 2017
[22]
L. Li et al., "CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles," in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 7, pp. 2204--2220, July 2018
[23]
L. S. Sankar, M. Sindhu, and M. Sethumadhavan, "Survey of consensus protocols on blockchain applications," 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, 2017, pp. 1--5.
[24]
M. Al-Jarrah and A. R. Tamimi, "A Thin Security Layer Protocol over IP Protocol on TCP/IP Suite for Security Enhancement," 2006 Innovations in Information Technology, Dubai, 2006, pp. 1--5.
[25]
N. Bozic, G. Pujolle and S. Secci, "A tutorial on blockchain and applications to secure network control-plane," 2016 3rd Smart Cloud Networks & Systems (SCNS), Dubai, 2016, pp. 1--8.
[26]
Omar Dib, Kei-Leo Brousmiche, Antoine Durand, Eric Thea, Elyes Ben Hamida, "Consortium Blockchains: Overview, Applications, and Challenges," International Conference on Wireless and Mobile Communications, ICWMC, Nice, June 2017.
[27]
S. Harrabi, W. Chainbi, and K. Ghedira, "A multi-agent proactive routing protocol for Vehicular Ad-Hoc Networks," The 2014 International Symposium on Networks, Computers, and Communications, Hammamet, 2014, pp. 1--6.
[28]
S. Kiyomoto, A. Basu, S. Rahman, and S. Ruj, "On blockchain-based authorization architecture for beyond-5G mobile services," 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), Cambridge, 2017, pp. 136--141.
[29]
S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008.
[30]
S. R. Basnet and S. Shakya, "BSS: Blockchain security over software defined network," 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, 2017
[31]
S. Raju, S. Boddepalli, S. Gampa, Q. Yan and J. S. Deogun, "Identity management using blockchain for cognitive cellular networks," 2017 IEEE International Conference on Communications (ICC), Paris, 2017, pp. 1--6.
[32]
Selimi Mennan, Rao Aniruddh, Ali Anwaar, Navarro Leandro, Sathiaseelan Arjuna, "Towards Blockchain-enabled Wireless Mesh Networks," 2018
[33]
Tong Jin, Xiang Zhang, Yirui Liu, Kai Lei, "BlockNDN: A bitcoin blockchain decentralized system over named data networking," 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 75--80, 2017
[34]
W. Hao-yu, C. Hui-Zhi, Z. Xu, J. Chao-jun and J. Xiao-Juan, "The Security and Promotion Method of Transport Layer of TCP/IP Agreement," 2010 Second International Conference on Information Technology and Computer Science, Kiev, 2010, pp. 513--517.
[35]
W. Y. Maung Maung Thin, N. Dong, G. Bai, and J. S. Dong, "Formal Analysis of a Proof-of-Stake Blockchain," 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, Australia, 2018, pp. 197--200.
[36]
Wang Xu, Zha Xuan, Ni Wei, Liu Ren, Guo Y, Niu Xinxin, and Zheng Kangfeng, "Survey on Blockchain for Internet of Things," Computer Communications, 2019
[37]
Xing, Q.; Wang, B.; Wang, X. "BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution," Symmetry 2018, 10, 408.
[38]
Y. Zhao and X. Zhang, "New media identity authentication and traffic optimization in a 5G network," 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, 2017, pp. 1331--1334.
[39]
Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung, Blockchain-based Decentralized Trust Management in Vehicular Networks, in IEEE Internet of Things Journal & 10.11.2018.
[40]
Zheng, Zibin & Xie, Shaoan & Dai, Hong-Ning & Chen, Xiangping & Wang, Huaimin, "Blockchain challenges and opportunities: A survey" International Journal of Web and Grid Services, 2018.

Cited By

View all
  • (2022)NFT-basedAccess Control in Named Data Networks2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00025(139-146)Online publication date: Dec-2022
  • (2021)Blockchain for decentralization of internet: prospects, trends, and challengesCluster Computing10.1007/s10586-021-03301-824:4(2841-2866)Online publication date: 1-Dec-2021
  • (2020)Blockchain technology in Named Data Networks: A detailed surveyJournal of Network and Computer Applications10.1016/j.jnca.2020.102840171(102840)Online publication date: Dec-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CCIOT '19: Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things
September 2019
134 pages
ISBN:9781450372411
DOI:10.1145/3361821
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Waseda University: Waseda University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. Network Function
  3. Performance
  4. Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CCIOT 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)NFT-basedAccess Control in Named Data Networks2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00025(139-146)Online publication date: Dec-2022
  • (2021)Blockchain for decentralization of internet: prospects, trends, and challengesCluster Computing10.1007/s10586-021-03301-824:4(2841-2866)Online publication date: 1-Dec-2021
  • (2020)Blockchain technology in Named Data Networks: A detailed surveyJournal of Network and Computer Applications10.1016/j.jnca.2020.102840171(102840)Online publication date: Dec-2020

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media