You are on page 1of 8

This article has been accepted for inclusion in a future issue of this magazine.

Content is final as presented, with the exception of pagination.


ACCEPTED FROM OPEN CALL

Blockchain for 5G: A Prelude to Future Telecommunication


Gorla Praveen, Vinay Chamola, Vikas Hassija, and Neeraj Kumar

ABSTRACT omous vehicle to operate correctly. However,


most of the IoT sensing applications involve the
5G and Blockchain are potentially revolution- generation and relaying of sensor data which is
izing future technologies. 5G promises high rates small in size, and thus these applications do not
and QoS to the users and blockchain guaran- need much bandwidth.
tees a high level of trust and security among the 5G incorporates various technologies like mas-
peers. Applications that would be using 5G have sive MIMO (Multi-Input Multi-Output), small cell,
varying needs in terms of speed, bandwidth, full duplex and beam-forming [3]. 5G technolo-
latency and various other factors. Augmented gy uses the millimetre spectrum for data transfer.
reality, self-driving vehicles and other IoT appli- These low energy millimeter waves cannot propa-
cations tend to use 5G for reliable and fast com- gate to significant distance and also get interfered
munication. To work seamlessly and securely in by the buildings, trees, and so on. Hence, a dense
such scenarios a more specialized and efficient network of small cells is deployed to act as repeat-
approach would be required. In this article, we ers and boost the degraded signal [4]. These small
have identified the specific areas where block- cells have a short range of 10 to 100m. The spe-
chain could be utilized to enhance the securi- cific characteristics of 5G are:
ty and privacy of the 5G services offered to the • Allotting high bandwidth (2GHz) to each
users. The current challenges faced in deploy- device
ment and upliftment of 5G and their related • Use of same channels for many devices
solutions based on blockchain are discussed. A • Considering the low latency requirements of
model for Multi-Operator Network Slicing in 5G various new devices/services [5, 6].
using blockchain is also presented along with 5G Blockchain is digital ledger technology (DLT)
blockchain implementation. which has become popular in recent years due
to its various advantages such as security, trans-
INTRODUCTION parency, immutability, and so on, [7]. Data that
Fifth-generation cellular network technology is stored in a blockchain cannot easily be tam-
(5G) aims at provisioning high data rate mobile pered. Each data block in the blockchain consists
services with QoS (Quality of Service) guaran- of the data, its hash value, hash of the preced-
tee. Real-time services like Augmented Reality, ing block, timestamp and a random nonce. Each
Virtual Reality, autonomous driving, real-time block also has a unique hash value to identify
gaming, and so on, are highly delay-sensitive. it and all of its contents. The hash is calculated
5G provides a low latency in the order of 1 ms when a block is created and will change if the
and less, which is very much needed for such content of the block is tampered. Thus, if at any
services. Other applications such as video con- point of time someone tries to tamper with the
ferencing require high bandwidth and data trans- data stored in a block, then the successor block
fer rate. 5G technology can readily facilitate which stores the hash value of its previous block
such stringent requirements due to its advanced invalidates it due to a mismatch of the hashes.
features as compared to previous cellular tech- Apart from the hash, there is another mecha-
nologies (i.e., 2G, 3G, and 4G). To cater to spe- nism called proof-of-work (POW) to increase the
cific demands of the various devices and services security. The POW mechanism provisions each
supported by the cellular network, 5G uses a miner to solve some problematic mathematical
concept called network slicing. Network slicing puzzle to be able to add a new block to the
involves creating numerous virtual connections chain. Miners are the specialized users in the
with a single network. The network resources are blockchain network that play the role of validat-
distributed among different virtual networks and ing and adding new blocks to the chain [8]. The
are utilized according to their specific require- working of blockchain is pictorially represent-
ments [1]. For example, an autonomous car ed in Fig. 1 indicating the different levels from
requires very fast, low latency connections for transaction initiation to final block validation and
real time operations, whereas many IoT sensing then appending it to the existing main chain.
applications/devices might require comparative- As depicted in Fig. 1, a transaction is initiated
ly less bandwidth. This is because autonomous from the user end, and the information such as
cars generate a large amount of data which is timestamp, user details and operators (and other
computationally intensive, which needs to be transaction-related details) are hashed as a block
fed back within real-time deadlines for the auton- and sent for validation by the blockchain net-

Digital Object Identifier: Gorla Praveen and Vinay Chamola are with BITS-Pilani; Vikas Hassija is with JIIT Noida; Neeraj Kumar is with Thapar University ,
10.1109/MNET.001.2000005 King Abdulaziz University and Asia University.

1 0890-8044/20/$25.00 © 2020 IEEE IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

work. Once nodes in all the blockchain network


approve the block, it is deployed on to the exist- A block with timestamp,
ing blockchain after processing the user transac- A new The block is delivered to
user, operator and other
tion. The applications of blockchain is actively transaction all the nodes in the
transaction related
explored in various industries like health-care, is initiated network
power and governance. Several uses of block- information is created
chain can be leveraged by CSPs (cellular service
providers) to provide future services of telecom
industries [9–11]. Blockchain can provide a dis-
tributed ledger for a core network of different
CSPs to be used in an insecure manner. Smart
Next, block is verified and approved
contracts can enable sharing of infrastructure by by all the nodes in the network
automatically handling the transaction charges
among the CSPs. Smart contracts are the self-ex-
ecutable agreements that can be deployed on Previous Hash Timestamp Previous Hash Timestamp
the blockchain and can trigger differently in dif- User Data Other details User Data Other details
ferent circumstances without any human inter-
vention. The application of blockchain for CSPs The block is added in the blockchain and linked with
can also be extended to fraud detection applica-
tions. Blockchain can facilitate the eSIM solution the previously existing blocks
and services like identity authentication.
In this article, the use of blockchain in 5G
FIGURE 1. Basic workflow of blockchain.
is the main emphasis. In the following section,
various existing and proposed blockchain appli- incorporating a new model of access technolo-
cations in 5G are presented. Implementation of gy mechanisms where blockchain can assist the
blockchain for 5G is discussed then and final con- device for establishing a connection to the vari-
clusions are drawn in the final section. ous networks.
Current Problem: In this current client-serv-
APPLICATIONS OF BLOCKCHAIN IN 5G er model, a centralized server (ANDSF) stores
In this section, various key areas of 5G in which the rules which are sent to the devices (i.e.,
blockchain can be applied are discussed. Major clients). Some of the problems it causes are
areas discussed in this section are as follows: delays due to centralization of ANDSF; no sup-
• Enabling 5G port by the device for continuous provisioning
• Blockchain-based Network Slice Broker in among the access network; and no provision
5G for real-time operations with dynamic change
• Fraud prevention of rules.
• Blockchain-based physical infrastructure shar- Blockchain Based Solution: The distributed
ing in 5G small-cell networks blockchain network can be used to connect the
• Blockchain-based 5G spectrum allocation, 3GPP access networks such as GPRS, LTE and
sharing and management so on, and non-3GPP access networks such as
• Managing data and providing service through Wi-Max, WiFi and so on, in a particular area.
establishing identity. In the setup, as shown in Fig. 2b, each access
point (e.g., cell tower, WiFi router) at a node
ENABLING 5G USING BLOCKCHAIN of the network will monitor the end devices. It
As soon as any device enters the cellular network, will help in deciding which access nodes will be
it has different options through which it can con- provisioned for a given end device. For exam-
nect to the network (e.g., cellular/WiFi/ WiMax). ple, if there are more than one access nodes in
In the existing system, as shown in Fig. 2a, Evolved the vicinity of the end device, multiple param-
Packet Core (EPC) of the network provisions the eters from the smart contract will weigh the
use of IP based packet-only for all the services merit of each access node and assign the best
within the 3GPP compliant networks. Access Net- possible one for the device. The smart contract
work Discovery and Selection Function (ANDSF), contains the rules and agreements between the
which is a part of EPC, assists the User Equip- various network carriers, which provides access.
ment (UE) in discovery, selection and connect- Whenever any policy or rule is to be changed,
ing to non-3GPP access networks such as WiFi these contracts can be changed accordingly.
or WiMax [12]. ANDSF also helps in offloading Whenever a change of rule is required a new
data traffic from the mobile network and provides contract through automatic generation of smart
them with rules that are mandatory for connect- rules ( based on required change) is formed
ing with these networks. It has information about and deployed the blockchain network. The
the device and a record of access networks based change of rule is applicable to the future trans-
on the device request which needs connection. It actions based on the newly deployed instance
also contains data about the interfaces supported of contract. Let us say that the parameters judg-
among the nodes for different access technolo- ing the best access nodes need some change
gies such as WiMax, WiFi and so on. in weights; this can be done efficiently using
Access to various networks, which is a core blockchain by forming a new contract. The CSP
feature of 5G technology, can be realized if and cell accepts the device, which then transmits
only if the CSPs can take care of all diverse access its identity. Then the access node provides the
nodes and mechanisms [13. The main challenge service to the device as soon as it broadcasts
in this is to select the quickest access node for its location. Also, as shown in Fig. 2b, loca-
every user. 5G networks can be improvised by tion-based services using blockchain access are

IEEE Network • Accepted for Publication 2


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

Car WLAN
Radio Access
Networks
(7) Application Private WLAN
Server
Mobile core network
(5) ANDSF server UE(1)
(4) P-GW
3GPP station
(2) LTE eNB (8) DNS server
(1) UE
(with ANDSF
Client) UE(2)
External Data
Public WLAN
(3) Wi-Fi AP
network
User WLAN
(6) Legacy UE(3)
switch

Location broadcast Smart contract P2P payment Connectivity provision

(a) (b)

FIGURE 2. a) Traditional model for Access Point selection; b) blockchain based Access Point selection in 5G.

provided through Public WLAN, Car WLAN and transaction costs. Since the Quality of Service
Private WLAN. Charges for the services used by (QoS) and price work are also parameters for
the various nodes will be continuously calculat- the smart contract, the efficiency of the negoti-
ed by the smart contract. ations on the Service Level Agreements are also
improved.
BLOCKCHAIN NETWORK SLICE (NS) BROKER IN 5G Smart contracts handle the network resource
In 5G, the concept of network slicing is to pro- allocation with the help of Master Operated Net-
vide many virtual network connections from a work Management (MONM). The blockchain
single physical backbone network using Net- saves the contract agreement only after both
work Function Virtualization [14]. The band- negotiators accept the conditions. The contracts
width of the network can be customized are deployed with time stamps and verified signa-
according to the service requirements. The tures to prevent the problem of non-repudiation.
use of network virtualization reduces infra- Since storing all the data in the distributed block-
structure cost. For example, if there are three chain is very expensive, only the important param-
types of services, traditional services (like voice eters such as time of starting or terminating the
call, SMS and so on), video services and IoT service, negotiated QoS parameters and charging
services, where each service requires diff erent evidence can be stored on the chain. The storage
bandwidth, a single physical network can be of all the important parameters in one block helps
used to serve these requirements. in fast authentication.
Use of Slice Broker: The slice broker has three Multi-Operator NS Allocation Procedure
main tasks, dynamic allocation of resources like Using Blockchain: Using the operator and the
bandwidth and data rate; supervision of the net- user details from multiple operators, a smart con-
work traffic and forecasting data flow in the net- tract for Standard Network slice is created, which
work; allocating the resources for the user based is a Global Multi-Operator Standard Network
on the Radio Access Network (RAN) scheduler Slice (GMOSNS) or simply Standard Network
configuration. Slice (SNS). Upon adding these smart contract
The 5G NS broker accesses the current details to the blockchain, a foreign user is served
resource availability from the infrastructure pro- according to smart contract for the network slice
vider (operator) and allocates network slice to allocation. The suggestive working of multi-opera-
UE as per request and Service Level Agreement tor Network Slicing with blockchain, as shown in
(SLA) for each user [14]. Figure 3a shows the Fig. 3b, is as follows.
process of network slicing in a pictorial manner. • Step 1: After approving the smart contract,
For NS operations between multiple operators, Global Multi-Operator Standardized Net-
there should be a mutual trust between the oper- work Slice information is distributed to all
ators for multi-operator slice creation. For this, the operators participating in the blockchain.
the NS brokers should not always be centralized, • Step 2: A Standard Network Slice is initially
and it is feasible to have a distributed network allocated to UE by the Home Network.
of slice brokers. A blockchain-based multi-opera- • Step 3: When the UE moves to the Visited
tor network slice creation model is proposed, as Network, a copy of the user information is
shown in Fig. 3b. requested by the Visited Network from the
How Blockchain Helps in Network Slicing: blockchain. The blockchain provides the
Blockchain provides the solution for the prob- same by sending a service Acknowledgment
lem discussed above. It can act as a distributed request to the UE’s Home Network.
ledger in the NS broker system, and the transac- • Step 4: Permission is granted by the block-
tions are verifi ed using the unique digital keys chain to access the Visited Network resourc-
of the users. Smart contracts in the blockchain es according to the smart contract.
are used for the automation of the repetitious • Step 5: Home Network controls the UE’s Vis-
and straightforward negotiations. They are also ited Network resources for allocating further
used to execute direct agreements which are Custom Network Slice upon UE’s request.
related to slice-brokering operations. The main Further, infrastructure sharing among multi-
advantage of using blockchain by deploying ple operators using blockchain is discussed later,
smart contract as a slice broker can signifi- where multi-operator network slice can be a part
cantly reduce the coordination complexity and of it. Furthermore, to prevent fraudulent activities

3 IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

when a user is in the Visited Network, another


blockchain model is presented below.

FRAUD PREVENTION
In the existing system, when a user places a call or
event, the Visited Public Mobile Network (VPMN)
inquiries the Host Public Mobile Network
(HPMN) to find the services subscribed by the
user who is out of their home network. It queries
the Home Location Register (HLR) to receive the
Call Detail Records (CDRs). The HPMN receives
the CDR information from the VPMN as a Trans-
fer Account Procedure (TAP) file, as shown in Fig.
4a. There are companies acting like a Data Clear-
ing House (DCH) for these files. They transmit
and convert the TAP files on behalf of the host
Consumer Service provider. The HPMN settles
the cost with VPMN according to their tariff rates.
Current Challenges: In general, when a user
goes out of the HPMN and connects to the (a)
VPMN, the VPMN charges the HPMN and then
the host network charges the user. A fraudulent Operator Operator
activity is comprised of such acts where the user and user(s)
information
and user(s)
information
bypasses the system by not paying the roaming
charge incurred through using the VPMN. These Smart contract
malicious users need to be identified, and fraud
prevention must be done in real-time. Anticipating Multi Operator details
these frauds and preventing them is a major con- Multi Operator
Step 1
cern for the telecom operators.
Standardised slice details
Contract details
Blockchain-Based Solution: A roaming agree-
ment can be formulated between the operators
with the permissioned blockchain, where a few
registered entities (Operators) are given the priv- Global Multi-Operator Standardised
Network Slice information
ilege to validate the data. The designated nodes
from both operators verify the originality of each Standard
transaction broadcasted on the network. A smart Network Step 2
contract is used to implement a roaming agree- Slice
ment between the HPMN and the VPMN, which
is invoked when a transaction is broadcasted on UE
the blockchain network, which contains the CDR Home Network Blockchain Network Visited Network
data. As shown in Fig. 4b, whenever a user ini-
tiates an event in a network, the CDR informa-
tion is broadcasted by the VPMN as a transaction Step 3 UE
to the HPMN. The smart contract is initiated by Standard
this data, and the conditions of the contract are Service
 User info req  Network
executed. Based on the services rendered, the acknowledgement
 User info  slice
assigned
billing amount is calculated by the HPMN and is
returned to the VPMN. This advocates settlement Permission grant to Permission UE
on the spot and confirms authorization to prevent Step 4 access Visted Network acknowledgement Custom
any fraudulent activity. The settlements also occur Network
slice
according to the blockchain-based smart contract Step 5
Controlling Visted Network resources allocated
terms which eliminate the need for DCH, result-
ing in an additional reduction in cost. UE
(b)
BLOCKCHAIN-BASED PHYSICAL INFRASTRUCTURE SHARING IN
5G C ELLULAR NETWORKS FIGURE 3. a) Network Slice structure; b) blockchain based multi-operator Net-
work Slice assignment in 5G.
Infrastructure in 5G: In the conventional com-
munication networks, each network operator
owns its infrastructure, which spans across the offer services to the subscribers of other opera-
large geographical area. For 5G, a dense network tors. A consortium of multiple operators can be
of small cells should be deployed, which increases formed with administrative privileges to approve
the cost for each operator to have their infrastruc- the associated nodes within the chain. Due to this
ture. So sharing of resources between the opera- selective addition of nodes, consortium block-
tors is the best possible way to cut down the cost. chain is more secure than a public chain for
Blockchain as a Solution: In a traditional sys- this scenario. Consortium blockchain and pub-
tem, infrastructure sharing is a complex issue lic blockchain are different from each other in
because of data being stored in a more central- terms of the permissible access. In consortium
ized way. Therefore, the use of blockchain can blockchain, only consortium group members have
provision to store the data in a distributed manner access to participate in the blockchain network,
where multiple operators can access this data to whereas in public blockchain, any blockchain

IEEE Network • Accepted for Publication 4


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

to perform a peer to peer transaction involv-


ing the guest operator account and serving
CDR CDR
operator account, based on the user’s data
consumption and the smart contract contents.
e rin   • Step 6: Finally, the UE is wholly detached,
and a copy of the updated information is
house
added to the Blockchain.
BLOCKCHAIN-BASED 5G SPECTRUM ALLOCATION,
Pay for service
S HARING AND MANAGEMENT
With the advancement in technology and new
  o e o er User
o in
  is or o er
User emerging devices, the need for spectrum alloca-
tion for high-speed data rates is indeed neces-
sary. Allocating new frequency bands is often a
(a)
critical task both in terms of technological and
economic feasibility. To avoid this, CSPs can
make use of existing frequency bands by sharing
o e o in r on r    o e
them between multiple operators. In this way, it
can help the operators to meet the rising traffic
demand. Dynamic Spectrum Sharing (DSS) helps
CDR-broadcast on Blockchain in reducing the network bottlenecks by sharing the
ri ers on r   unused bands with the other operators. DSS in 5G
o e
User
istor User is a promising solution for accommodating a high-
o er o er
er number of devices/services within the existing
Pay for service
spectrum. However, spectrum sharing in 5G has
(b)
potential risks of affecting its core characteristics if
proper care is not taken for its inception.
FIGURE 4. a) Traditional system for roaming pact when user is in VPMN; Challenges of Spectrum Sharing in 5G: The
b) proposed blockchain based system for 5G roaming pact when user is in following are some of the challenges of Spectrum
VPMN. sharing in 5G:
Regulations: Most telecommunication regu-
node has access to blockchain data and can also latory authorities across the world do not allow
participate in the blockchain process. Figures 5a(i) spectrum sharing between multiple operators.
and 5a(ii) depict the infrastructure sharing meth- Most often, operators are prohibited from the
odology using blockchain for 5G. voluntary sharing of their spectrum. One of the
Blockchain Implementation Model for 5G factors for this is ineffi cient spectrum manage-
Infra Sharing: A new block is created in the ment practices that result in network degrada-
chain whenever an operator configures a new tion.
SIM. Blocks with the SIM card and user subscrip- Centralization: Existing telecommunication
tion offer details are distributed to all the nodes networks are centralized systems and cannot
for verification and is added to the chain upon handle the efficient spectrum sharing practices.
approval. The suggestive working of attachment Due to centralization, there is no sharing of data
and detachment of the UE with eNodeB as shown between multiple operators’ network systems for
in Fig. 5a is as follows. provisioning spectrum sharing.
• Step 1: After performing a smart contract, Heterogeneity: Spectrum sharing between het-
When the client buys a SIM card, the oper- erogeneous networks such as macro, micro, pico,
ator validates the client. Then, an encrypted and femtocells, often called HetNets, is a critical
digital proof of client validity is sent to the task. Spectrum sharing between these cells may
blockchain. cause interference which also degrades the over-
• Step 2: When the UE sends an attach request to all performance of the network.
the Evolved Packet Core (EPC) of the network, Blockchain-Based Solution: Blockchain can
EPC gets the International Mobile Subscriber be used for efficiently enabling Dynamic Spec-
Identity (IMSI) information from the message. trum sharing in 5G as discussed in [2]. A con-
If the UE belongs to the serving network, a null sortium blockchain-based Spectrum sharing
transaction is performed by the smart contract; framework is formed with a smart contract. The
else the smart contract sends the authentication network consists of both the CSP’s and telecom
keys of the UE to the Mobile Management Enti- regulatory authorities as multi-stakeholders. The
ty (MME) for authentication and security mech- smart contract contains the spectrum allocation,
anisms toward the UE. sharing and management strategies along with
• Step 3: Once the authentication process is the spectrum sharing the rental cost. The sugges-
complete, MME requests and receives sub- tive procedure for the basic Dynamic Spectrum
scriber information from the distributed Sharing between multi-operators using block-
ledger. After receiving the subscriber infor- chain is as follows:
mation, the UE is provided service by the • Step 1: Multiple operators broadcast their
MME. status about the usage of frequency bands
• Step 4: When the UE terminates the service, and their respective locations to the nodes in
the UE session is ended while notifying the the distributed ledger. Blockchain maintains
same to the distributed ledger. the record of this status in its blocks. This is
• Step 5: Smart contract receives the UE user’s a periodic process to provision for Dynamic
subscription offer information, and their IMSI Spectral Sharing between the operators.

5 IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

Distributed ledger Distributed ledger


Node 1 Node 2
Node 1 Node 2
EPC (Op. 1) EPC (Op.2)
EPC (Op. 1) EPC (Op.2)

Step 1

Smart contract
- Operator details Smart contract
on r er s
- Event details - Operator details
- Standard services on r er s
- Event details
UE eNodeB - Standard services
UE eNodeB
Attach Request
Authentication
request
Dettach Request
If IMSI:
Step 4
Delete GTP
   U e s Session Notify request
Else: Step 2
o U e s If IMSI belong Op1:
  1. Create new block
  2. Update subscriber
   
Authentication
response If IMSI belong Op2:
NAS Security Setup Step 5
  1. Create new block for
  U e s s ri er
Location update  
req   e e n n i  
NAS Security Setup r ns ion  fro o 
If subscription: Op.1
   s ri ion Notify response
data Step 3 Detach
Accept
Else:
Step 6
EPS Session    ee se
s is en Location
Procedure update Resp

i en eq en e i r sin o in ii e en eq en e i r sin o in

(a)

Saftey Verifier
1. Opens CPS provided ID er i e sen for
stored User
New user App on phone eri ion
on eSIM Digital
Private key Challenge
solved using er i e
4. Encrypted challenges 2. App is er i e to the
private key connected
Te e o sent to assigned after ID   
Blockchain
Public key to
Virtual ID verify authenticity authentication Blockchain
Virtual Identity Stored on en e Blockchain
User
created Blockchain authenticated
irtual identity info CSP
Partner sent to partner
CSP
application

(i) ID Creation (ii) ID Authentication iii n e en

(b)

FIGURE 5. a) Blockchain based UE attachment and detachment procedure for Infrastructure sharing in 5G;
b) Blockchain based Data Management services in 5G.

• Step 2: When a primary operator’s spectrum Through blockchain, telecom regulatory


is wholly occupied, and there is a need for authorities can perform Dynamic Spectrum Allo-
more spectrum resources to provide services cation (DSA) for multiple operators based on
to the primary users, the primary operator’s immediate needs of service (such as Network Slic-
Base Station (BS) sends a request to the ing as discussed above) and region of demand.
blockchain network. This provisions the regulatory authorities to
• Step 3: Blockchain then sends the spectrum continuously monitor the spectrum allocation,
sharing requests to the secondary operator’s spectrum sharing and network parameters, thus
BS near the primary operator’s BS, to allo- increasing the trust in operators and security of
cate the available spectrum. the regional telecommunication network, and the
• Step 4: The secondary operator sends enabling of blockchain in 5G also provisions for
Acknowledgment (ACK) to the blockchain spectrum sharing between Heterogeneous 5G
and allocates unused spectrum (Overlay networks by reducing the interference between
Spectrum) for the primary operator, while them with ease of management.
continuously monitoring its own spectrum
demand. A specific period is allocated for MANAGING DATA AND PROVIDING SERVICE THROUGH
spectrum sharing. As soon as the allocation ESTABLISHING IDENTITY
time is completed or the secondary operator In addition to user data management, CSPs can
has its own spectrum demand to serve its generate additional revenue with the help of
users, spectrum sharing is terminated. The blockchain by providing user identity authentica-
same is notified in the blockchain network. tion services to their partners.
• Step 5: Financial transactions are performed The CSP creates a digital identity for the new
between the operators through smart con- subscriber. This digital identity consisting of pub-
tracts. Finally, spectrum sharing is completely lic identity with subscriber details is added to the
terminated between operators for this ses- blockchain, and the private key associated with this
sion and information is updated and stored identity is stored in eSIM, as shown in Fig. 5b(i).
in the blockchain. When a subscriber needs to authenticate their iden-

IEEE Network • Accepted for Publication 6


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

450
End block height = 100
End block height = 1000
400

Median Block Propogation Time ( msec )


350

300

250

200

150

100

50
0 1 2 3 4 5 6
Number of multi-operator nodes # 10 4
Old nodes New nodes
(a) (b)

FIGURE 6. a) Multi-Operator 5G Blockchain network map; b) Block propagation time analysis for multi-operator based 5G Blockchain.

tity on any of the CSPs partners’ services, the sub- of the number of blocks in a blockchain for the
scriber’s virtual identity created on the blockchain same number of blockchain nodes. The median
can be used to authenticate the subscriber, that block propagation time for 1000 (one thousand)
is, any CSP’s partner who would like to validate a multi-operator blockchain nodes is less than 100
subscriber for any purpose can use the subscriber’s ms, and for 60,000 (sixty thousand) multi-operator
public virtual identity available on the blockchain to blockchain nodes it is less than 450 ms. On evalua-
do the same. Here, the subscriber uses their private tion (Fig. 6b), block propagation in a 5G blockchain
key to sign this authentication process digitally, as network is more than 20 times faster than existing
shown in Fig. 5b(ii). During the process of comple- blockchain networks [15]. That is, median block
tion, in every step, the blockchain is updated with propagation time between 10000 multi-operator
the pointer pointing to the created virtual identity nodes in this implementation is 339.5 ms against
with the required descriptors. the current value of 8849.5 ms in the existing net-
work. Therefore, 5G can significantly increase the
IMPLEMENTATION OF BLOCKCHAIN FOR 5G scalability and the performance of the blockchain
In this section, the specifications of 5G are incor- network. Moreover, approach to improving the
porated in blockchain to observe the median block performance of blockchain networks can be used
propagation time concerning the total number of in deploying it for providing and enhancing various
nodes. As shown in Fig. 6a, a multi-operator based application-based services in 5G, such as Block-
5G blockchain is simulated across the different chain-based multi-operator infrastructure sharing;
geographic regions. Blockchain nodes from North Blockchain-based multi-operator Network Slicing;
America, Europe, South America, Asia, Japan and and fraud prevention and to increase the security
Australia are considered for this implementation. of the network.
The distribution density of nodes is based on rela- In the future, realistic implementation of block-
tive currently available nodes in those regions. The chain has several challenges. Some of them are:
probability of distribution of the nodes across these • Synchronization issues of UE association and
regions is 0.3869, 0.5159, 0.011, 0.0574, 0.0119 dissociation with block validation timing
and 0.0166, respectively. Based on the region, • Reducing power consumption of the block-
forecasted average 5G bandwidth (average highest chain nodes for achieving low power mode
being 2Gb/s) and latency are estimated and incor- • Latency aware operations of the blockchain
porated in this simulation. Figure 6a represents a nodes to validate a block for achieving actu-
5G blockchain network connectivity model at a al 5G specified latencies.
time instant of block propagating between nodes
across these regions. In this figure, a circle denotes CONCLUSION
a blockchain node, and its color is associated with The implementation of 5G networks is still in the
the latest block of the node while a large circle testbed stage and standards are being formulat-
is a miner corresponding to it. Moreover, link (b) ed. We present an array of possibilities such as
is propagation from node to another node at the multi-operator network slicing, fraud prevention,
timestamp, and its color is associated with the flow- physical infrastructure sharing, spectrum manage-
ing block while indicating the newly received block ment, user identity authentication and data man-
in bold at the timestamp. agement services using blockchain in 5G cellular
Figure 6b is a graph between median prop- networks. We also evaluated a multi-operator 5G
agation time of a block in a blockchain and the blockchain network, which has increased the per-
number of multi-operator blockchain nodes it is formance of 5G blockchain network.
propagating. The median propagation time of a
block is the total time that a block takes to prop- ACKNOWLEDGMENT
agate between all the designated network nodes. This work is supported by DST-SERB (Science
As observed from the graph, the propagation time and Engineering Research Board (SERB)) funding
of the block is approximately the same, irrespective under Project Grant File no. ECR/2018/001479.

7 IEEE Network • Accepted for Publication


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.

REFERENCES [14] K. Samdanis, X. Costa-Perez, and V. Sciancalepore, “From


Network Sharing to Multi-Tenancy: The 5G Network Slice
[1] X. Li et al., “Network Slicing for 5G: Challenges and Oppor- Broker,” IEEE Commun. Mag., vol. 54, no. 7, July 2016, pp.
tunities,” IEEE Internet Computing, vol. 21, no. 5, 2017, pp. 32–39.
20–27. [15] C. Decker and R. Wattenhofer, “Information Propagation
[2] B. Mafakheri et al., “Blockchainbased Infrastructure Sharing in the Bitcoin Network,” Proc. IEEE P2P 2013, Sept. 2013,
in 5G Small Cell Networks,” Proc. IEEE CNSM, Nov. 2018, pp. 1–10.
Rome, Italy, pp. 1-8.
[3] B. Zhou, A. Liu, and V. Lau, “Successive Localization and
Beamforming in 5G mmWave MIMO Communication BIOGRAPHIES
Systems,” IEEE Trans. Signal Processing, vol. 67, no. 6, Mar. G ORLA P RAVEEN is a research student at the Birla Institute of
2019, pp. 1620–35. Technology & Science (BITS), Pilani, India. He received his
[4] Z. Chen et al., “A Security Authentication Scheme of 5G B.Tech in electronics and communication engineering and M.En-
Ultra-Dense Network Based on Block Chain,” IEEE Access, gg with specialization in telecommunication engineering from
vol. 6, 2018, pp. 55 372–79. the College of Engineering Hyderabad, Jawaharlal Nehru Tech-
[5] M. A. Rahman et al., “Blockchain-Based Mobile Edge Com- nological University Hyderabad, India, and the Asian Institute
puting Framework for Secure Therapy Applications,” IEEE of Technology, Thailand, respectively, in 2019. His research
Access, vol. 6, 2018, pp. 72 469–78. interests include indoor localization, wireless communications,
[6] J. Sachs et al., “Adaptive 5G Low-Latency Communication 5G and quantum-assistive communications
for Tactile Internet Services,” Proc. IEEE, vol. 107, no. 2, Feb.
2019, pp. 325–49. VINAY CHAMOLA is an assistant professor at the Birla Institute
[7] M. Crosby et al., “BlockChain Technology Beyond Bitcoin,” of Technology & Science (BITS), Pilani, India. He received his
Tech. Rep., Oct. 2015, last accessed on 15-Aug.-2019; avail- B.E. (2010) and M.E. (2013) degrees from BITS, Pilani, and the
able: http: //scet.berkeley.edu/wp-content/uploads/Block- Ph.D. degree (2016) from the National University of Singpaore
chainPaper.pdf. (NUS), Singapore. He has co-authored more than 45 papers in
[8] Y. Xu and Y. Huang, “MWPoW — Multi-Winner Proof of respected journals and magazines like IEEE TCOM, IEEE TVT,
Work Consensus Protocol: An Immediate Block-Confirm IEEE IoTJ, IEEE TSE, IEEE JSAC, IEEE Communications Magazine,
Solution and an Incentive for Common Devices to Join etc., and serves as a guest editor for Computer Communication
Blockchain,” Proc. 2018 IEEE Intl. Conf. Parallel Distributed and other journals. His research interests include IoT security,
Processing with Applications, Ubiquitous Computing Com- Blockchain, 5G network management, VANETs, UAV Nets,
mun., Big Data Cloud Computing, Social Computing Net- and BCI.
working, Sustainable Computing Commun. (ISPA/IUCC/
BDCloud/SocialCom/SustainCom), Dec. 2018, pp. 964–71. VIKAS HASSIJA is an assistant professor at the Jaypee Institute
[9] M. R. Gramatke and M. Sallaba, “How Blockchain Can of Information and Technology, Noida, India. He received his
Impact Telecommunication Industry,” Tech. Rep., last B.Tech degree from M.D.U University, Rohtak, India, in 2010
accessed on 2-Aug.- 2019; available: https://www2.deloitte. and the M.S. degree in telecommunications and software engi-
com/za/en/pages/technology-media-and-telecommunica- neering from the Birla Institute of Technology & Science, Pilani,
tions/articles/blockchain_telco.pdf. India in 2014. His research interests include 5G network provi-
[10] K. Valtanen, J. Backman, and S. Yrjola, “Blockchain-Pow- sioning, Blockchain and network security.
ered Value Creation in the 5G and Smart Grid Use Cases,”
IEEE Access, vol. 7, Feb. 2019, pp. 25 690–25 707. NEERAJ KUMAR is an associate professor in the Computer Sci-
[11] Z. Xiong et al., “When Mobile Blockchain Meets Edge Comput- ence & Engineering Department, Thapar Institute of Engineering
ing,” IEEE Commun. Mag., vol. 56, no. 8, Aug. 2018, pp. 33–39. & Technology, Patiala. He is also an adjunct professor at King
[12] A. Pérez, Network Discovery and Selection, Wiley, 2018, Abdulaziz University, Jeddah, Saudi Arabia, and at Asia Universi-
pp. 183–99; available: https://ieeexplore.ieee.org/docu- ty, Taiwan. He received his Ph.D. in CSE from SMVD University,
ment/8607872 Katra (J & K), India, and was a postdoctoral research fellow
[13] H. Klessig et al., “From Immune Cells to Self-Organizing at Coventry University, Coventry, UK. He is an internationally
Ultra-Dense Small Cell Networks,” IEEE JSAC, vol. 34, no. 4, renowned researcher in the areas of VANET, CPS smart grid, IoT
Apr. 2016, pp. 800–11. mobile cloud computing, big data, and cryptography.

IEEE Network • Accepted for Publication 8


Authorized licensed use limited to: University of Canberra. Downloaded on May 01,2020 at 10:07:31 UTC from IEEE Xplore. Restrictions apply.

You might also like