Skip to main content

Table 2 Comparison of SLA audit schemes

From: A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme

Scheme

Distributed model

Multiple parameters

Security

Privacy protection

SLA-M [8]

 

\(\surd\)

  

SLA-ICM [14]

\(\surd\)

 

\(\surd\)

 

Sec-rSLA [13]

\(\surd\)

 

\(\surd\)

 

Our scheme

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)