Blockchain in Telecom: An Insight into the Potential Benefits of Combining Blockchain, 5G, IoT, Cloud Computing, and AI/ML in the Telecom Business
()
About this ebook
The purpose of this book is to educate readers about the capabilities of Blockchain technology and how it can be used to address several complex issues in the telecommunications industry, including international roaming, inter-carrier settlement, real-time billing, spectrum allocation, managing KYC, and mobile/e-payment solutions in today's business environment. Additionally, novel revenue-generating business models, such as B2B2X, content provider, and underutilized service monetization, are discussed in length throughout this book.
Readers will benefit from reading the chapters as they establish plans for integrating Blockchain technology into the telecoms industry alongside other new technologies such as 5G and IoT, as well as AI/ML, cloud computing, and edge computing. Additionally, this book will help them in managing implementation plans through risk mitigation for implementation and migration.
Related to Blockchain in Telecom
Related ebooks
Business Models in Emerging Technologies: Data Science, AI, and Blockchain Rating: 0 out of 5 stars0 ratingsBlockchain in e-Governance: Driving the next Frontier in G2C Services (English Edition) Rating: 0 out of 5 stars0 ratingsLTE Self-Organising Networks (SON): Network Management Automation for Operational Efficiency Rating: 0 out of 5 stars0 ratingsThe Edge Data Center: Building the Connected Future Rating: 0 out of 5 stars0 ratingsBreaking Digital Gridlock: Improving Your Bank's Digital Future by Making Technology Changes Now Rating: 0 out of 5 stars0 ratingsBlockchain for Business with Hyperledger Fabric: A complete guide to enterprise blockchain implementation using Hyperledger Fabric Rating: 0 out of 5 stars0 ratingsHyperledger Fabric In-Depth: Learn, Build and Deploy Blockchain Applications Using Hyperledger Fabric Rating: 0 out of 5 stars0 ratings5G Mobile Core Network: Design, Deployment, Automation, and Testing Strategies Rating: 0 out of 5 stars0 ratingsThink Blockchain: A Student's Guide to Blockchain's Evolution from Bitcoin, Ethereum, Hyperledger to Web3. Rating: 0 out of 5 stars0 ratingsBlockchain and IoT Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsTELECOM ORGANIZATIONS ADAPT IN A POST-COVID-19 REALITY Rating: 0 out of 5 stars0 ratingsMigration of Network Infrastructure: Project Management Experience Rating: 0 out of 5 stars0 ratings5G IoT and Edge Computing for Smart Healthcare Rating: 0 out of 5 stars0 ratingsPrivate 5G: A Systems Approach Rating: 0 out of 5 stars0 ratingsThe Impact of 5G on Society: 5G technology can connect people, devices, infrastructures, and objects. Rating: 0 out of 5 stars0 ratingsBlockchain And Supply Chain Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings5G mMTC Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsBlockchain Digital Standard Requirements Rating: 0 out of 5 stars0 ratingsBig Data Analytics for Cyber-Physical Systems: Machine Learning for the Internet of Things Rating: 0 out of 5 stars0 ratingsMobile edge computing A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsBlockchain Consortium The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsmmWave 5G Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsMachine-to-Machine M2M Communications Third Edition Rating: 0 out of 5 stars0 ratingsOpenFlow Cookbook Rating: 5 out of 5 stars5/55G Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsEdge Cloud Operations: A Systems Approach Rating: 0 out of 5 stars0 ratingsArtificial Intelligence (AI) Unleashed Rating: 0 out of 5 stars0 ratingsOSS Masterclasses - Insights from Thought-Leaders in Operational Support Systems (OSS) Rating: 0 out of 5 stars0 ratingsOracle GoldenGate With Microservices: Real-Time Scenarios with Oracle GoldenGate Rating: 0 out of 5 stars0 ratings
Certification Guides For You
Coding For Dummies Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA A+ Certification Passport, Sixth Edition (Exams 220-901 & 220-902) Rating: 4 out of 5 stars4/5CompTIA A+ Certification All-in-One For Dummies Rating: 3 out of 5 stars3/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Microsoft Office 365 for Business Rating: 4 out of 5 stars4/5Comptia A+ 220-901 Q & A Study Guide: Comptia 21 Day 900 Series, #2 Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner All-in-One Exam Guide (Exam CLF-C01) Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Project+ Practice Tests: Exam PK0-004 Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5How to Get Started as a Technical Writer Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1101 Rating: 0 out of 5 stars0 ratingsCompTIA Data+ Study Guide: Exam DA0-001 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA A+ Certification Passport, Seventh Edition (Exams 220-1001 & 220-1002) Rating: 2 out of 5 stars2/5CCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsSalesforce Certification: Earn Salesforce certifications and increase online sales real and unique practice tests included Kindle Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) Rating: 1 out of 5 stars1/5CompTIA A+ Complete Study Guide: Exam Core 1 220-1001 and Exam Core 2 220-1002 Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5
Reviews for Blockchain in Telecom
0 ratings0 reviews
Book preview
Blockchain in Telecom - Shibaji Sankar Biswas
CHAPTER 1
The Case of Blockchain
Introduction
The blockchain technology was introduced by Bitcoin, and given its potential across industries and sectors, it is now a buzzword in the technology world. The blockchain or the distributed ledger technology (DLT) is all about the idea of a decentralized network against the conventional centralized mechanism, and is deemed to have far-reaching implications on sectors and entities that have long relied upon a trusted third-party. A lot of start-ups are innovating new ideas on Robo-advising, digital payment, personal finance management, loan lending, regtech, investment trading, and digital wallet by developing the newly decentralized applications, eliminating the presence of any centralized mediators like the traditional banks.
The main underlying technology which has helped to open this new era of decentralized financial business is Blockchain or DLT, which is now being adopted not only in the fintech sector but also in a wide range of industries. The leaders across a wide range of industries like supply chain, health care, manufacturing, retail, media, and government are firmly grasping the blockchain's transformative potential. Although the blockchain technology has the potential to solve many complex issues, the adoption of it is still very slow in the telecommunication industry. The blockchain technology refers to the technological infrastructure and protocols that allow simultaneous access, validation, and record updating in an immutable manner across a network that is spread across multiple entities or locations.
In the subsequent chapters, we will discuss the transformative potential of the blockchain technology in the telecommunication industry.
Structure
In this chapter, we will cover the following topics:
Concept of blockchain.
Types of blockchains, industry use cases, and consensus.
Objective
After studying this chapter, you will be able to understand the concept of blockchain framework, including the concept of blockchain transactions, block validation, distributed consensus algorithms, and application and use cases of the blockchain technology.
Concept of Blockchain
Blockchain is a decentralized distributed ledger (data structure), where the data is being stored inside blocks in the form of transactions immutably in a cryptographically secured way.
By definition, Blockchain is a consensus-based, secured decentralized public/private ledger which stores information immutably over a peer-to-peer network.
The first blockchain was conceptualized by Satoshi Nakamoto in the Bitcoin whitepaper in 2008.
It proposed a system where two parties transact directly with each other with the following features:
Peer-to-peer payments over an online network.
The elimination of third parties and replacing trust with verification.
Transactions would be irreversible and cannot be manipulated or altered in any manner.
A peer-to-peer distributed timestamp server would generate mathematical proof of the chronological order of transactions.
The system is secure, so long as honest participants collectively control more computing power than the attackers/hackers. Each block in the blockchain contains transactions and block header. The first block in the blockchain is called the Genesis block.
Each block header contains the following information:
A hash value of the previous block:
A hash value is a unique digital fingerprint of a piece of data. A SHA256 hashing algorithm is used for the hash generation. It converts a string of arbitrary length into a 256-bit hexadecimal string. Any change in the string will generate a completely new hash.
Editing any transaction data inside a block by the attackers will generate a completely new hash, but the next block in the blockchain will still contain the old hash. So, the attackers would need to update that block to cover their tracks. However, doing so would change that block's hash, and the next, and so on. It makes the attack impractical due to the requirements of the huge computing power and time. This architectural design makes the entries in the blocks