2023
DOI: 10.1016/j.future.2022.11.008
|View full text |Cite
|
Sign up to set email alerts
|

The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Many people want quicker internet, better data services, and better user experiences. Telecommunications companies have been encouraged by this consumer demand to invest in 5G networks to fulfill their customers' rising expectations 8 .…”
Section: Introductionmentioning
confidence: 99%
“…Many people want quicker internet, better data services, and better user experiences. Telecommunications companies have been encouraged by this consumer demand to invest in 5G networks to fulfill their customers' rising expectations 8 .…”
Section: Introductionmentioning
confidence: 99%
“…A honey badger algorithm (HB) is a robust optimisation technique that was introduced by Hashim et al in 2022 [23]. It has been applied to various real-world applications, such as optimal load balancing in wireless 5G [24], parameter estimation of photovoltaic systems [25], minimisation of voltage deviation in an AMG [26], and parameter identification of the Hammerstein-Wiener model [27]. In this study, the HB algorithm, based on the MBFS method described in [22], is developed to detect the appropriate size and placement of droop-controlled DDGs in the AMG 33-bus system.…”
Section: Introductionmentioning
confidence: 99%
“…The blocks of data spread are protected by employing cryptographical models. After a novel block is combined into the chain, it is highly thought that the novel block can able to cooperate with all other blocks in the chain [7]. Proof of Work (PoW) is an effective method that is mainly employed for merging blocks by adding a hash function in the present block and then piting it.…”
Section: Introductionmentioning
confidence: 99%