Skip to main content

2022 | OriginalPaper | Buchkapitel

A Blockchain-Based Authentication Scheme for 5G Applications

verfasst von : Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, Li Su

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication mechanisms are important security features for mobile operators and application providers. In addition to the primary authentication between user equipment and the mobile operator network, secondary authentication between the user and Data Networks owned by the application is introduced in the 5G system. However, the implementation of secondary authentication introduces some challenges to application providers, not only the cost but also the capability, which leaves space for improving. In this paper, we designed an authentication mechanism for applications based on blockchain. With this mechanism, mobile operators and the application providers are able to share authentication related information like authentication results, users’ identification, users’ attribute information, users’ reputation and users’ blacklists, etc. securely. As a result, some application providers could execute user access control without deploying their own authentication systems any more. In addition with the shared comprehensive user information, mobile operators and application providers can make more fine and intelligent user access control.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat 3gpp tr 33.899: Study on the security aspects of the next generation system. Accessed 27 Oct 2021 3gpp tr 33.899: Study on the security aspects of the next generation system. Accessed 27 Oct 2021
3.
Zurück zum Zitat 3gpp ts 23.501 (v16.1.0): System architecture for the 5g system. Accessed 27 Oct 2021 3gpp ts 23.501 (v16.1.0): System architecture for the 5g system. Accessed 27 Oct 2021
4.
Zurück zum Zitat 3gpp ts 33.102 (v16.0.0): 3g security: security architecture. Accessed 27 Oct 2021 3gpp ts 33.102 (v16.0.0): 3g security: security architecture. Accessed 27 Oct 2021
5.
Zurück zum Zitat 3gpp ts 33.501 (v16.4.0): Security architecture and procedures for 5g system. Accessed 27 Oct 2021 3gpp ts 33.501 (v16.4.0): Security architecture and procedures for 5g system. Accessed 27 Oct 2021
9.
Zurück zum Zitat Ietf rfc 3748: Extensible authentication protocol (EAP). Accessed 27 Oct 2021 Ietf rfc 3748: Extensible authentication protocol (EAP). Accessed 27 Oct 2021
10.
Zurück zum Zitat Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020) Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
11.
Zurück zum Zitat Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1–15 (2018) Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1–15 (2018)
12.
Zurück zum Zitat Cachin, C., et al.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, vol. 310 (2016) Cachin, C., et al.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, vol. 310 (2016)
13.
Zurück zum Zitat Gorenflo, C., Lee, S., Golab, L., Keshav, S.: FastFabric: Scaling hyperledger fabric to 20 000 transactions per second. Int. J. Netw. Manag. 30(5), e2099 (2020)CrossRef Gorenflo, C., Lee, S., Golab, L., Keshav, S.: FastFabric: Scaling hyperledger fabric to 20 000 transactions per second. Int. J. Netw. Manag. 30(5), e2099 (2020)CrossRef
14.
Zurück zum Zitat Huang, X., Yoshizawa, T., Baskaran, S.B.M.: Authentication mechanisms in the 5G system. J. ICT Standard. 61–78 (2021) Huang, X., Yoshizawa, T., Baskaran, S.B.M.: Authentication mechanisms in the 5G system. J. ICT Standard. 61–78 (2021)
15.
Zurück zum Zitat König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center BLOCKCHAINS: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. 10(3), 110–127 (2020) König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center BLOCKCHAINS: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. 10(3), 110–127 (2020)
16.
Zurück zum Zitat Ranjan, S., Negi, A., Jain, H., Pal, B., Agrawal, H.: Network system design using hyperledger fabric: permissioned blockchain framework. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–6. IEEE (2019) Ranjan, S., Negi, A., Jain, H., Pal, B., Agrawal, H.: Network system design using hyperledger fabric: permissioned blockchain framework. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–6. IEEE (2019)
17.
Zurück zum Zitat Ribalta, C.N., Lombard-Platet, M., Salinesi, C., Lafourcade, P.: Blockchain mirage or silver bullet? A requirements-driven comparative analysis of business and developers’ perceptions in the accountancy domain. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 12(1), 85–110 (2021) Ribalta, C.N., Lombard-Platet, M., Salinesi, C., Lafourcade, P.: Blockchain mirage or silver bullet? A requirements-driven comparative analysis of business and developers’ perceptions in the accountancy domain. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 12(1), 85–110 (2021)
18.
Zurück zum Zitat Shih, C.S., Hsieh, W.Y., Kao, C.L.: Traceability for vehicular network real-time messaging based on blockchain technology. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 1–21 (2019) Shih, C.S., Hsieh, W.Y., Kao, C.L.: Traceability for vehicular network real-time messaging based on blockchain technology. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 1–21 (2019)
19.
Zurück zum Zitat Song, F., Ai, Z., Zhang, H., You, I., Li, S.: Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Ind. Inf. (2020) Song, F., Ai, Z., Zhang, H., You, I., Li, S.: Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Ind. Inf. (2020)
20.
Zurück zum Zitat Song, F., Ai, Z., Zhou, Y., You, I., Choo, K.K.R., Zhang, H.: Smart collaborative automation for receive buffer control in multipath industrial networks. IEEE Trans. Industr. Inf. 16(2), 1385–1394 (2019)CrossRef Song, F., Ai, Z., Zhou, Y., You, I., Choo, K.K.R., Zhang, H.: Smart collaborative automation for receive buffer control in multipath industrial networks. IEEE Trans. Industr. Inf. 16(2), 1385–1394 (2019)CrossRef
21.
Zurück zum Zitat Song, F., Li, L., You, I., Zhang, H.: Enabling heterogeneous deterministic networks with smart collaborative theory. IEEE Netw. 35(3), 64–71 (2021)CrossRef Song, F., Li, L., You, I., Zhang, H.: Enabling heterogeneous deterministic networks with smart collaborative theory. IEEE Netw. 35(3), 64–71 (2021)CrossRef
22.
Zurück zum Zitat Tu, Z., Zhou, H., Li, K., Li, G.: DCTG: degree constrained topology generation algorithm for software-defined satellite network. J. Internet Serv. Inf. Secur. 9(4), 49–58 (2019) Tu, Z., Zhou, H., Li, K., Li, G.: DCTG: degree constrained topology generation algorithm for software-defined satellite network. J. Internet Serv. Inf. Secur. 9(4), 49–58 (2019)
Metadaten
Titel
A Blockchain-Based Authentication Scheme for 5G Applications
verfasst von
Lanfang Ren
Xiaoting Huang
Huachun Zhou
Bo Yang
Li Su
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_12

Premium Partner