Skip to main content

Table 2 Comparison of SLA audit schemes

From: A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme

Scheme Distributed model Multiple parameters Security Privacy protection
SLA-M [8]   \(\surd\)   
SLA-ICM [14] \(\surd\)   \(\surd\)  
Sec-rSLA [13] \(\surd\)   \(\surd\)  
Our scheme \(\surd\) \(\surd\) \(\surd\) \(\surd\)