Professional Documents
Culture Documents
Digital Object Identifier: Gorla Praveen and Vinay Chamola are with BITS-Pilani; Vikas Hassija is with JIIT Noida; Neeraj Kumar is with Thapar University ,
10.1109/MNET.001.2000005 King Abdulaziz University and Asia University.
Car WLAN
Radio Access
Networks
(7) Application Private WLAN
Server
Mobile core network
(5) ANDSF server UE(1)
(4) P-GW
3GPP station
(2) LTE eNB (8) DNS server
(1) UE
(with ANDSF
Client) UE(2)
External Data
Public WLAN
(3) Wi-Fi AP
network
User WLAN
(6) Legacy UE(3)
switch
(a) (b)
FIGURE 2. a) Traditional model for Access Point selection; b) blockchain based Access Point selection in 5G.
provided through Public WLAN, Car WLAN and transaction costs. Since the Quality of Service
Private WLAN. Charges for the services used by (QoS) and price work are also parameters for
the various nodes will be continuously calculat- the smart contract, the efficiency of the negoti-
ed by the smart contract. ations on the Service Level Agreements are also
improved.
BLOCKCHAIN NETWORK SLICE (NS) BROKER IN 5G Smart contracts handle the network resource
In 5G, the concept of network slicing is to pro- allocation with the help of Master Operated Net-
vide many virtual network connections from a work Management (MONM). The blockchain
single physical backbone network using Net- saves the contract agreement only after both
work Function Virtualization [14]. The band- negotiators accept the conditions. The contracts
width of the network can be customized are deployed with time stamps and verified signa-
according to the service requirements. The tures to prevent the problem of non-repudiation.
use of network virtualization reduces infra- Since storing all the data in the distributed block-
structure cost. For example, if there are three chain is very expensive, only the important param-
types of services, traditional services (like voice eters such as time of starting or terminating the
call, SMS and so on), video services and IoT service, negotiated QoS parameters and charging
services, where each service requires diff erent evidence can be stored on the chain. The storage
bandwidth, a single physical network can be of all the important parameters in one block helps
used to serve these requirements. in fast authentication.
Use of Slice Broker: The slice broker has three Multi-Operator NS Allocation Procedure
main tasks, dynamic allocation of resources like Using Blockchain: Using the operator and the
bandwidth and data rate; supervision of the net- user details from multiple operators, a smart con-
work traffic and forecasting data flow in the net- tract for Standard Network slice is created, which
work; allocating the resources for the user based is a Global Multi-Operator Standard Network
on the Radio Access Network (RAN) scheduler Slice (GMOSNS) or simply Standard Network
configuration. Slice (SNS). Upon adding these smart contract
The 5G NS broker accesses the current details to the blockchain, a foreign user is served
resource availability from the infrastructure pro- according to smart contract for the network slice
vider (operator) and allocates network slice to allocation. The suggestive working of multi-opera-
UE as per request and Service Level Agreement tor Network Slicing with blockchain, as shown in
(SLA) for each user [14]. Figure 3a shows the Fig. 3b, is as follows.
process of network slicing in a pictorial manner. • Step 1: After approving the smart contract,
For NS operations between multiple operators, Global Multi-Operator Standardized Net-
there should be a mutual trust between the oper- work Slice information is distributed to all
ators for multi-operator slice creation. For this, the operators participating in the blockchain.
the NS brokers should not always be centralized, • Step 2: A Standard Network Slice is initially
and it is feasible to have a distributed network allocated to UE by the Home Network.
of slice brokers. A blockchain-based multi-opera- • Step 3: When the UE moves to the Visited
tor network slice creation model is proposed, as Network, a copy of the user information is
shown in Fig. 3b. requested by the Visited Network from the
How Blockchain Helps in Network Slicing: blockchain. The blockchain provides the
Blockchain provides the solution for the prob- same by sending a service Acknowledgment
lem discussed above. It can act as a distributed request to the UE’s Home Network.
ledger in the NS broker system, and the transac- • Step 4: Permission is granted by the block-
tions are verifi ed using the unique digital keys chain to access the Visited Network resourc-
of the users. Smart contracts in the blockchain es according to the smart contract.
are used for the automation of the repetitious • Step 5: Home Network controls the UE’s Vis-
and straightforward negotiations. They are also ited Network resources for allocating further
used to execute direct agreements which are Custom Network Slice upon UE’s request.
related to slice-brokering operations. The main Further, infrastructure sharing among multi-
advantage of using blockchain by deploying ple operators using blockchain is discussed later,
smart contract as a slice broker can signifi- where multi-operator network slice can be a part
cantly reduce the coordination complexity and of it. Furthermore, to prevent fraudulent activities
FRAUD PREVENTION
In the existing system, when a user places a call or
event, the Visited Public Mobile Network (VPMN)
inquiries the Host Public Mobile Network
(HPMN) to find the services subscribed by the
user who is out of their home network. It queries
the Home Location Register (HLR) to receive the
Call Detail Records (CDRs). The HPMN receives
the CDR information from the VPMN as a Trans-
fer Account Procedure (TAP) file, as shown in Fig.
4a. There are companies acting like a Data Clear-
ing House (DCH) for these files. They transmit
and convert the TAP files on behalf of the host
Consumer Service provider. The HPMN settles
the cost with VPMN according to their tariff rates.
Current Challenges: In general, when a user
goes out of the HPMN and connects to the (a)
VPMN, the VPMN charges the HPMN and then
the host network charges the user. A fraudulent Operator Operator
activity is comprised of such acts where the user and user(s)
information
and user(s)
information
bypasses the system by not paying the roaming
charge incurred through using the VPMN. These Smart contract
malicious users need to be identified, and fraud
prevention must be done in real-time. Anticipating Multi Operator details
these frauds and preventing them is a major con- Multi Operator
Step 1
cern for the telecom operators.
Standardised slice details
Contract details
Blockchain-Based Solution: A roaming agree-
ment can be formulated between the operators
with the permissioned blockchain, where a few
registered entities (Operators) are given the priv- Global Multi-Operator Standardised
Network Slice information
ilege to validate the data. The designated nodes
from both operators verify the originality of each Standard
transaction broadcasted on the network. A smart Network Step 2
contract is used to implement a roaming agree- Slice
ment between the HPMN and the VPMN, which
is invoked when a transaction is broadcasted on UE
the blockchain network, which contains the CDR Home Network Blockchain Network Visited Network
data. As shown in Fig. 4b, whenever a user ini-
tiates an event in a network, the CDR informa-
tion is broadcasted by the VPMN as a transaction Step 3 UE
to the HPMN. The smart contract is initiated by Standard
this data, and the conditions of the contract are Service
User info req Network
executed. Based on the services rendered, the acknowledgement
User info slice
assigned
billing amount is calculated by the HPMN and is
returned to the VPMN. This advocates settlement Permission grant to Permission UE
on the spot and confirms authorization to prevent Step 4 access Visted Network acknowledgement Custom
any fraudulent activity. The settlements also occur Network
slice
according to the blockchain-based smart contract Step 5
Controlling Visted Network resources allocated
terms which eliminate the need for DCH, result-
ing in an additional reduction in cost. UE
(b)
BLOCKCHAIN-BASED PHYSICAL INFRASTRUCTURE SHARING IN
5G C ELLULAR NETWORKS FIGURE 3. a) Network Slice structure; b) blockchain based multi-operator Net-
work Slice assignment in 5G.
Infrastructure in 5G: In the conventional com-
munication networks, each network operator
owns its infrastructure, which spans across the offer services to the subscribers of other opera-
large geographical area. For 5G, a dense network tors. A consortium of multiple operators can be
of small cells should be deployed, which increases formed with administrative privileges to approve
the cost for each operator to have their infrastruc- the associated nodes within the chain. Due to this
ture. So sharing of resources between the opera- selective addition of nodes, consortium block-
tors is the best possible way to cut down the cost. chain is more secure than a public chain for
Blockchain as a Solution: In a traditional sys- this scenario. Consortium blockchain and pub-
tem, infrastructure sharing is a complex issue lic blockchain are different from each other in
because of data being stored in a more central- terms of the permissible access. In consortium
ized way. Therefore, the use of blockchain can blockchain, only consortium group members have
provision to store the data in a distributed manner access to participate in the blockchain network,
where multiple operators can access this data to whereas in public blockchain, any blockchain
Step 1
Smart contract
- Operator details Smart contract
on r er s
- Event details - Operator details
- Standard services on r er s
- Event details
UE eNodeB - Standard services
UE eNodeB
Attach Request
Authentication
request
Dettach Request
If IMSI:
Step 4
Delete GTP
U e s Session Notify request
Else: Step 2
o U e s If IMSI belong Op1:
1. Create new block
2. Update subscriber
Authentication
response If IMSI belong Op2:
NAS Security Setup Step 5
1. Create new block for
U e s s ri er
Location update
req e e n n i
NAS Security Setup r ns ion fro o
If subscription: Op.1
s ri ion Notify response
data Step 3 Detach
Accept
Else:
Step 6
EPS Session ee se
s is en Location
Procedure update Resp
i en eq en e i r sin o in ii e en eq en e i r sin o in
(a)
Saftey Verifier
1. Opens CPS provided ID er i e sen for
stored User
New user App on phone eri ion
on eSIM Digital
Private key Challenge
solved using er i e
4. Encrypted challenges 2. App is er i e to the
private key connected
Te e o sent to assigned after ID
Blockchain
Public key to
Virtual ID verify authenticity authentication Blockchain
Virtual Identity Stored on en e Blockchain
User
created Blockchain authenticated
irtual identity info CSP
Partner sent to partner
CSP
application
(b)
FIGURE 5. a) Blockchain based UE attachment and detachment procedure for Infrastructure sharing in 5G;
b) Blockchain based Data Management services in 5G.
450
End block height = 100
End block height = 1000
400
300
250
200
150
100
50
0 1 2 3 4 5 6
Number of multi-operator nodes # 10 4
Old nodes New nodes
(a) (b)
FIGURE 6. a) Multi-Operator 5G Blockchain network map; b) Block propagation time analysis for multi-operator based 5G Blockchain.
tity on any of the CSPs partners’ services, the sub- of the number of blocks in a blockchain for the
scriber’s virtual identity created on the blockchain same number of blockchain nodes. The median
can be used to authenticate the subscriber, that block propagation time for 1000 (one thousand)
is, any CSP’s partner who would like to validate a multi-operator blockchain nodes is less than 100
subscriber for any purpose can use the subscriber’s ms, and for 60,000 (sixty thousand) multi-operator
public virtual identity available on the blockchain to blockchain nodes it is less than 450 ms. On evalua-
do the same. Here, the subscriber uses their private tion (Fig. 6b), block propagation in a 5G blockchain
key to sign this authentication process digitally, as network is more than 20 times faster than existing
shown in Fig. 5b(ii). During the process of comple- blockchain networks [15]. That is, median block
tion, in every step, the blockchain is updated with propagation time between 10000 multi-operator
the pointer pointing to the created virtual identity nodes in this implementation is 339.5 ms against
with the required descriptors. the current value of 8849.5 ms in the existing net-
work. Therefore, 5G can significantly increase the
IMPLEMENTATION OF BLOCKCHAIN FOR 5G scalability and the performance of the blockchain
In this section, the specifications of 5G are incor- network. Moreover, approach to improving the
porated in blockchain to observe the median block performance of blockchain networks can be used
propagation time concerning the total number of in deploying it for providing and enhancing various
nodes. As shown in Fig. 6a, a multi-operator based application-based services in 5G, such as Block-
5G blockchain is simulated across the different chain-based multi-operator infrastructure sharing;
geographic regions. Blockchain nodes from North Blockchain-based multi-operator Network Slicing;
America, Europe, South America, Asia, Japan and and fraud prevention and to increase the security
Australia are considered for this implementation. of the network.
The distribution density of nodes is based on rela- In the future, realistic implementation of block-
tive currently available nodes in those regions. The chain has several challenges. Some of them are:
probability of distribution of the nodes across these • Synchronization issues of UE association and
regions is 0.3869, 0.5159, 0.011, 0.0574, 0.0119 dissociation with block validation timing
and 0.0166, respectively. Based on the region, • Reducing power consumption of the block-
forecasted average 5G bandwidth (average highest chain nodes for achieving low power mode
being 2Gb/s) and latency are estimated and incor- • Latency aware operations of the blockchain
porated in this simulation. Figure 6a represents a nodes to validate a block for achieving actu-
5G blockchain network connectivity model at a al 5G specified latencies.
time instant of block propagating between nodes
across these regions. In this figure, a circle denotes CONCLUSION
a blockchain node, and its color is associated with The implementation of 5G networks is still in the
the latest block of the node while a large circle testbed stage and standards are being formulat-
is a miner corresponding to it. Moreover, link (b) ed. We present an array of possibilities such as
is propagation from node to another node at the multi-operator network slicing, fraud prevention,
timestamp, and its color is associated with the flow- physical infrastructure sharing, spectrum manage-
ing block while indicating the newly received block ment, user identity authentication and data man-
in bold at the timestamp. agement services using blockchain in 5G cellular
Figure 6b is a graph between median prop- networks. We also evaluated a multi-operator 5G
agation time of a block in a blockchain and the blockchain network, which has increased the per-
number of multi-operator blockchain nodes it is formance of 5G blockchain network.
propagating. The median propagation time of a
block is the total time that a block takes to prop- ACKNOWLEDGMENT
agate between all the designated network nodes. This work is supported by DST-SERB (Science
As observed from the graph, the propagation time and Engineering Research Board (SERB)) funding
of the block is approximately the same, irrespective under Project Grant File no. ECR/2018/001479.