{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:58:16Z","timestamp":1772499496717,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF)","doi-asserted-by":"publisher","award":["2021R1A2C2014333"],"award-info":[{"award-number":["2021R1A2C2014333"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The network slicing of physical infrastructure is required for fifth-generation mobile networks to make significant changes in how service providers deliver and defend services in the face of evolving end-user performance requirements. To perform this, a fast and secure slicing technique is employed for node allocation and connection establishment, which necessitates the usage of a large number of domain applications across the network. PROMETHEE-II and SLE algorithms were used in this study\u2019s approach to network design for node allocation and link construction, respectively. The PROMETHEE-II approach takes into account a variety of node characteristics while constructing a node importance rank array (NIRA), including the node capacity, bandwidth of neighboring connections, degree of the node, and proximity centrality among others. The SLE method is proposed to record all possible link configurations for the network slice request (NSR) nodes to guarantee that the shortest path array (SPA) of the NSR has a high acceptance rate. Performance metrics such as the service revenue and acceptance ratio were considered to evaluate the effectiveness of the suggested approach. The effectiveness of network slicing has been further examined under different infrastructure models to determine whether a small-world network structure is beneficial to 5G network. For each scenario, simulations were carried out and the results were compared to previously published findings from other sources.<\/jats:p>","DOI":"10.3390\/s23031556","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T01:36:59Z","timestamp":1675215419000},"page":"1556","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Optimal Resource Allocation for 5G Network Slice Requests Based on Combined PROMETHEE-II and SLE Strategy"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2416-2322","authenticated-orcid":false,"given":"Sujitha","family":"Venkatapathy","sequence":"first","affiliation":[{"name":"School of Computer Information and Communication Engineering, Kunsan National University, Gunsan 54150, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3761-9360","authenticated-orcid":false,"given":"Thiruvenkadam","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Vellore Institute of Technology, Vellore 632014, Tamilnadu, India"}]},{"given":"Han-Gue","family":"Jo","sequence":"additional","affiliation":[{"name":"School of Computer Information and Communication Engineering, Kunsan National University, Gunsan 54150, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3936-1116","authenticated-orcid":false,"given":"In-Ho","family":"Ra","sequence":"additional","affiliation":[{"name":"School of Computer Information and Communication Engineering, Kunsan National University, Gunsan 54150, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"ref_1","unstructured":"5G PPP Architecture Working Group (2018, January 31). View on 5G Architecture: Version 2.0. 2017, pp. 1\u2013117. Available online: https:\/\/discovery.ucl.ac.uk\/id\/eprint\/10043680."},{"key":"ref_2","first-page":"1","article-title":"Description of network slicing concept","volume":"1","author":"Alliance","year":"2016","journal-title":"NGMN 5G P"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1600940","article-title":"Network slicing based 5G and future mobile networks: Mobility, resource management, and challenges","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","unstructured":"(2018). Study on Management and Orchestration of Network Slicing for Next Generation Network, 3GPP."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Nojima, D., Katsumata, Y., Shimojo, T., Morihiro, Y., Asai, T., Yamada, A., and Iwashina, S. (2018, January 3\u20136). Resource isolation in RAN part while utilizing ordinary scheduling algorithm for network slicing. Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal.","DOI":"10.1109\/VTCSpring.2018.8417638"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2738","DOI":"10.1109\/ACCESS.2016.2560218","article-title":"Joint user-association and resource-allocation in virtualized wireless networks","volume":"4","author":"Parsaeefard","year":"2016","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tang, L., Zhang, X., Xiang, H., Sun, Y., and Peng, M. (2017, January 3\u20136). Joint resource allocation and caching placement for network slicing in fog radio access networks. Proceedings of the 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan.","DOI":"10.1109\/SPAWC.2017.8227791"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Bega, D., Gramaglia, M., Banchs, A., Sciancalepore, V., Samdanis, K., and Costa-Perez, X. (2017, January 1\u20134). Optimising 5G infrastructure markets: The business of network slicing. Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications, Atlanta, GA, USA.","DOI":"10.1109\/INFOCOM.2017.8057045"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sama, M.R., An, X., Wei, Q., and Beker, S. (2016, January 3\u20136). Reshaping the mobile core network via function decomposition and network slicing for the 5G Era. Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar.","DOI":"10.1109\/WCNC.2016.7564652"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TNSM.2016.2569020","article-title":"Orchestrating virtualized network functions","volume":"13","author":"Bari","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TNSM.2016.2549563","article-title":"Scheduling wireless virtual networks functions","volume":"13","author":"Riggio","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","article-title":"Network slicing for 5G with SDN\/NFV: Concepts, architectures, and challenges","volume":"55","author":"Ameigeiras","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_13","unstructured":"Herker, S., Khan, A., and An, X. (2013, January 24\u201329). Survey on survivable virtual network embedding problem and solutions. Proceedings of the International Conference on Networking and Services, ICNS, Lisbon, Portugal."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Leconte, M., Paschos, G.S., Mertikopoulos, P., and Kozat, U.C. (2018, January 16\u201319). A resource allocation framework for network slicing. Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, HI, USA.","DOI":"10.1109\/INFOCOM.2018.8486303"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCOMSTD.2018.1700072","article-title":"A survey and an analysis of network slicing in 5G networks","volume":"2","author":"Kaloxylos","year":"2018","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-021-01983-7","article-title":"Network slicing: A next generation 5G perspective","volume":"2021","author":"Subedi","year":"2021","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TNET.2011.2159308","article-title":"Vineyard: Virtual network embedding algorithms with coordinated node and link mapping","volume":"20","author":"Chowdhury","year":"2011","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/MNET.011.2000089","article-title":"Convergence of networking and cloud\/edge computing: Status, challenges, and opportunities","volume":"34","author":"Duan","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"19691","DOI":"10.1109\/ACCESS.2018.2822398","article-title":"A service-oriented deployment policy of end-to-end network slicing based on complex network theory","volume":"6","author":"Guan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_20","unstructured":"Aarts, E., and Korst, J. (1989). Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing, John Wiley and Sons, Inc."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/CC.2016.7732010","article-title":"Virtual 5G network embedding in a heterogeneous and multi-domain network infrastructure","volume":"13","author":"Yu","year":"2016","journal-title":"China Commun."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F., and Davy, S. (2015, January 13\u201317). Design and evaluation of algorithms for mapping and scheduling of virtual network functions. Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, UK.","DOI":"10.1109\/NETSOFT.2015.7116120"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/JIOT.2017.2773489","article-title":"Novel node-ranking approach and multiple topology attributes-based embedding algorithm for single-domain virtual network embedding","volume":"5","author":"Cao","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"61184","DOI":"10.1109\/ACCESS.2018.2876544","article-title":"Adaptive virtual resource allocation in 5G network slicing using constrained Markov decision process","volume":"6","author":"Tang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ma, T., Zhang, Y., Wang, F., Wang, D., and Guo, D. (2020). Slicing Resource Allocation for eMBB and URLLC in 5G RAN. Wirel. Commun. Mob. Comput., 1\u201311.","DOI":"10.1155\/2020\/6290375"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.asoc.2016.09.009","article-title":"Efficient beamforming and spectral efficiency maximization in a joint transmission system using an adaptive particle swarm optimization algorithm","volume":"49","author":"Faisal","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"150517","DOI":"10.1109\/ACCESS.2019.2947454","article-title":"Efficient and secure 5G core network slice provisioning based on VIKOR approach","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Abidi, M.H., Alkhalefah, H., Moiduddin, K., Alazab, M., Mohammed, M.K., Ameen, W., and Gadekallu, T.R. (2021). Optimal 5G network slicing using machine learning and deep learning concepts. Comput. Stand. Interfaces, 76.","DOI":"10.1016\/j.csi.2021.103518"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/TII.2020.3047843","article-title":"A graph neural network-based digital twin for network slicing management","volume":"18","author":"Wang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Albert","year":"1999","journal-title":"Science"},{"key":"ref_31","unstructured":"Dong, Z., Wang, Z., Xie, W., Emelumadu, O., Lin, C., and Rojas-Cessa, R. (2015, January 20\u201322). An experimental study of small world network model for wireless networks. Proceedings of the 2015 36th IEEE Sarnoff Symposium, Newark, NJ, USA."},{"key":"ref_32","unstructured":"Guennebaud, G., and Jacob, B. (2018, January 31). Eigen. Version 3. Available online: http:\/\/eigen.tuxfamily.org."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gao, L., Li, P., Pan, Z., Liu, N., and You, X. (2016, January 15\u201318). Virtualization framework and VCG based resource block allocation scheme for LTE virtualization. Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China.","DOI":"10.1109\/VTCSpring.2016.7504529"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1504\/IJOR.2014.064541","article-title":"Applying Dijkstra\u2019s algorithm for general shortest path problem with normal probability distribution arc length","volume":"21","author":"Olya","year":"2014","journal-title":"Int. J. Oper. Res."},{"key":"ref_35","unstructured":"Brans, J., and Mareschal, B. (2005). Multiple Criteria Decision Analysis: State of the Art Surveys, Figueira, Springer."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1556\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:20:15Z","timestamp":1760120415000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,31]]},"references-count":35,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031556"],"URL":"https:\/\/doi.org\/10.3390\/s23031556","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,31]]}}}