{"id":"https://openalex.org/W3116107871","doi":"https://doi.org/10.1109/icct50939.2020.9295823","title":"Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT","display_name":"Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT","publication_year":2020,"publication_date":"2020-10-28","ids":{"openalex":"https://openalex.org/W3116107871","doi":"https://doi.org/10.1109/icct50939.2020.9295823","mag":"3116107871"},"language":"en","primary_location":{"id":"doi:10.1109/icct50939.2020.9295823","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct50939.2020.9295823","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 20th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081594946","display_name":"Ihsan H. Abdulqadder","orcid":"https://orcid.org/0000-0003-0727-0487"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ihsan H. Abdulqadder","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012385922","display_name":"Shijie Zhou","orcid":"https://orcid.org/0000-0001-8314-754X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijie Zhou","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China","Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075776596","display_name":"Israa T. Aziz","orcid":"https://orcid.org/0000-0003-3629-0444"},"institutions":[{"id":"https://openalex.org/I12150220","display_name":"University of Mosul","ror":"https://ror.org/039cf4q47","country_code":"IQ","type":"education","lineage":["https://openalex.org/I12150220"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Israa T. Aziz","raw_affiliation_strings":["University of Mosul, Mosul, Iraq"],"affiliations":[{"raw_affiliation_string":"University of Mosul, Mosul, Iraq","institution_ids":["https://openalex.org/I12150220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018927630","display_name":"Syed Muhammad Abrar Akber","orcid":"https://orcid.org/0000-0002-8863-2568"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Syed Muhammad Abrar Akber","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5081594946"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":1.8501,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.86887777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"499","last_page":"507"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8368089199066162},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6766726970672607},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6765735745429993},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5881281495094299},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.5716888308525085},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5220270752906799},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.48054319620132446},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.4580158293247223},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.44815266132354736},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.41256552934646606},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.41251328587532043},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39131394028663635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23659101128578186},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14226457476615906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8368089199066162},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6766726970672607},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6765735745429993},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5881281495094299},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.5716888308525085},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5220270752906799},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.48054319620132446},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.4580158293247223},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.44815266132354736},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41256552934646606},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.41251328587532043},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39131394028663635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23659101128578186},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14226457476615906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icct50939.2020.9295823","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct50939.2020.9295823","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 20th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2471733240","https://openalex.org/W2578477250","https://openalex.org/W2737097631","https://openalex.org/W2777934020","https://openalex.org/W2800753141","https://openalex.org/W2891362044","https://openalex.org/W2892583370","https://openalex.org/W2903945215","https://openalex.org/W2915021465","https://openalex.org/W2919358060","https://openalex.org/W2930768404","https://openalex.org/W2936630130","https://openalex.org/W2940733710","https://openalex.org/W2954485493","https://openalex.org/W2963073179","https://openalex.org/W2963527625","https://openalex.org/W2964142276","https://openalex.org/W2965829475","https://openalex.org/W2970262160","https://openalex.org/W2973097699","https://openalex.org/W2975191072","https://openalex.org/W2976187720","https://openalex.org/W2977958491","https://openalex.org/W2989255594","https://openalex.org/W3034315788","https://openalex.org/W3153065649","https://openalex.org/W6754785440"],"related_works":["https://openalex.org/W2809541058","https://openalex.org/W2684962896","https://openalex.org/W2055658744","https://openalex.org/W4301858902","https://openalex.org/W4220837700","https://openalex.org/W2949881910","https://openalex.org/W2891274976","https://openalex.org/W2077545426","https://openalex.org/W2012852954","https://openalex.org/W2305888825"],"abstract_inverted_index":{"Lightweight":[0],"security":[1,32,54],"provisioning":[2],"is":[3,100,117,142],"a":[4,51],"recent":[5],"topic":[6],"in":[7,57,112,119],"resource-constrained":[8],"software-defined":[9],"networking":[10],"(SDN).":[11],"Integration":[12],"between":[13],"SDN,":[14],"internet":[15],"of":[16,62],"things":[17],"(IoT),":[18],"network":[19,90],"function":[20,91],"virtualization":[21],"(NFV)":[22],"provides":[23],"massive":[24],"application":[25],"services":[26],"for":[27],"5G/B5G":[28,66],"communications.":[29],"Current":[30],"state-of-the-art":[31],"solutions":[33],"were":[34],"caused":[35],"by":[36,123],"higher":[37],"resource":[38],"consumption,":[39],"weaker":[40],"key":[41],"distribution,":[42],"and":[43,129,144],"forged":[44],"credentials.":[45],"In":[46],"this":[47],"paper,":[48],"we":[49,69,85],"proposed":[50],"blockchain-based":[52],"lightweight":[53],"architecture":[55],"(Bloc-Sec)":[56],"SDN/NFV":[58],"that":[59,109],"enabled":[60],"cloud":[61],"IoT":[63,72],"networks":[64],"with":[65],"communication.":[67],"Firstly,":[68],"authenticate":[70],"all":[71],"devices":[73],"to":[74,102],"the":[75,87,94,105,115,120,125,145],"blockchain":[76,99],"server":[77],"using":[78,93,133],"multiple":[79],"factors":[80],"Blake-256":[81],"hashing":[82],"algorithm.":[83,97],"Secondly,":[84],"select":[86],"optimal":[88],"virtual":[89],"(VNF)":[92],"cuttlefish":[95],"optimization":[96],"Thirdly,":[98],"invoked":[101],"keep":[103],"store":[104],"hashed":[106],"flow":[107],"rules":[108],"are":[110],"deployed":[111],"VNF.":[113],"Fourthly,":[114],"controller":[116],"involved":[118],"packet":[121,126,130],"classification":[122],"proposing":[124],"header":[127],"inspection":[128,132],"content":[131],"spiking":[134],"dual":[135],"fuzzy":[136],"neural":[137],"networks.":[138],"For":[139],"testing,":[140],"NS3.26":[141],"implemented":[143],"performance":[146],"evaluated.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
