University of Oulu

T. Hewa, A. Kalla, P. Porambage, M. Liyanage and M. Ylianttila, "How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?," 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland, 2021, pp. 1525-1531, doi: 10.1109/PIMRC50174.2021.9569375.

How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?

Saved in:
Author: Hewa, Tharaka1; Kalla, Anshuman1; Porambage1;
Organizations: 1Centre for Wireless Communications, University of Oulu, Finland
2School of Computer Science, University College Dublin, Ireland
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.7 MB)
Persistent link:
Language: English
Published: Institute of Electrical and Electronics Engineers, 2021
Publish Date: 2023-03-22


Several recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is that it can be victimized by DoS (Denial of Service) attack. Thus, the aim of this work is three fold. First, to present the possible ways in which DoS/DDoS attacks can be mounted on NSB and their adverse effects. Second, to propose and implement initial blockchain-based solution named as Security Service Blockchain (SSB) to prevent DoS attacks on NSB. Third, to enumerate the challenges and future research directions to effectively utilize blockchain for mitigating DoS/DDoS attacks on NSB. To evaluate the performance the proposed SSB framework is implemented using Hyperledger Fabric. The results manifest that the latency impact of the legitimate slice creation over scaled up malicious traffic remains minimal with the use of SSB framework. The integration of SSB with NSB results in gaining several fold reduction in latency under DoS attack scenario.

see all

Series: IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications workshops
ISSN: 2166-9570
ISSN-E: 2166-9589
ISSN-L: 2166-9570
ISBN: 978-1-7281-7586-7
ISBN Print: 978-1-7281-7587-4
Pages: 1525 - 1531
DOI: 10.1109/PIMRC50174.2021.9569375
Host publication: 32nd IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2021
Conference: Annual International Symposium on Personal, Indoor and Mobile Radio Communications
Type of Publication: A4 Article in conference proceedings
Field of Science: 213 Electronic, automation and communications engineering, electronics
Funding: This work has been performed under 6Genesis Flagship (grant 318927) and 5GEAR projects. The research leading to these results partly received funding from European Union’s Horizon 2020 research and innovation programme under grant agreement no 871808 (5G PPP project INSPIRE-5Gplus). The paper reflects only the authors’ views. The Commission is not responsible for any use that may be made of the information it contains.
EU Grant Number: (871808) INSPIRE-5Gplus - INtelligent Security and PervasIve tRust for 5G and Beyond
Academy of Finland Grant Number: 318927
Detailed Information: 318927 (Academy of Finland Funding decision)
Copyright information: © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.