Skip to main content

Blockchain-Based Mobility Management for LTE and Beyond

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2019)

Abstract

If LTE has made it possible to stream music and video over mobile devices such as smartphones and tablets, 5G will enable vehicles, sensors, and other countless devices to interact and share data over the cellular network. To unleash the full potential of 5G, it is imperative to address the shortcomings of LTE in regard to mobility management. One major challenge with LTE is improving the handover performance and security. In order to enhance the performance and security of the handover process, this paper introduces an approach using blockchain for key derivation and key sharing. This novel approach, Blockchain Key Derivation Function (BKDF), ensures tighter security as well as faster handover between the base stations. With blockchain adding an extra layer of security, the network is able to securely derive the handover key and share it with the base stations and mobile devices in the pre-handover phase, which significantly reduces the number of operations required during the intra-handover phase. A formal security analysis on BKDF is conducted with the Burrows-Abadi-Needham (BAN) logic, followed by an analysis on the effectiveness of BKDF against some of the well-known types of network attacks. The simulation results confirm that BKDF reduces handover latency and improves link stability with decrease in packet loss in the intra-handover phase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Duan, X., Wang, X.: Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. In: IEEE ICC 2016 Communication and Information Systems Security Symposium (2016)

    Google Scholar 

  2. Duan, X., Wang, X.: Authentication handover and privacy protection in 5G HetNets using software-defined networking. IEEE Commun. Mag. 53(4), 28–35 (2015)

    Article  Google Scholar 

  3. Tesema, F.B., Awada, A., Viering, I., Simsek, M., Fettweis, G.P.: Fast cell select for mobility robustness in intra-frequency 5G ultra dense networks. In: IEEE 27th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–7 (2016)

    Google Scholar 

  4. Arshad, R., et al.: Handover management in 5G and beyond : a topology aware skipping approach. IEEE Access 4, 9073–9081 (2017)

    Article  Google Scholar 

  5. Habbal, A., Member, S., Goudar, S.I., Hassan, S., Member, S.: Context-aware radio access technology selection in 5G ultra dense networks. IEEE Access 14(8), 1–13 (2017)

    Google Scholar 

  6. Wang, X., et al.: Handover reduction in virtualized cloud radio access networks using TWDM-PON fronthaul. J. Opt. Soc. Am. 8(12), 124–134 (2016)

    Google Scholar 

  7. Jung, M.Y., Jang, J.W.: Data management and searching system and method to provide increased security for IoT platform. In: International Conference on Information and Communication Technology. ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017, December 2017, pp. 873–878 (2017)

    Google Scholar 

  8. Ram Basnet, S., Shakya, S.: BSS: blockchain security over software defined network. In: IEEE ICCCA, pp. 720–725 (2017)

    Google Scholar 

  9. Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: International Conference on Advanced Communication Technology, ICACT, pp. 464–467 (2017)

    Google Scholar 

  10. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)

    Google Scholar 

  11. Rao, V.S., Gajula, R.: Interoperable UE Handovers in LTE. Radysis (2011)

    Google Scholar 

  12. Secp256k1. https://en.bitcoin.it/wiki/Secp256k1. Accessed 02 May 2018

  13. Guo, N.A.N., Wang, X.: An anonymous authentication scheme based on PMIPv6 for VANETs. IEEE Access 6, 14686–14698 (2018)

    Article  Google Scholar 

  14. Jawad Alam, M., Ma, M.: DC and CoMP authentication in LTE-advanced 5G HetNet. In: Proceedings of IEEE Global Communications Conference, GLOBECOM 2017, January 2018, pp. 1–6 (2018)

    Google Scholar 

  15. Han, C.K., Choi, H.K.: Security analysis of handover key management in 4G LTE/SAE networks. IEEE Trans. Mob. Comput. 13(2), 457–468 (2014)

    Article  Google Scholar 

  16. Cichonski, J., Franklin, J.M., Bartock, M.: Guide to LTE Security. NIST Special Publication 800-187 (2018)

    Google Scholar 

Download references

Acknowledgments

We appreciate the financial support from Ministry of Education, Singapore through the Academic Research Fund (AcRF) Tier 1 for the project of 2018-T1-001-092.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Han Lee or Maode Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lee, H., Ma, M. (2019). Blockchain-Based Mobility Management for LTE and Beyond. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24907-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24906-9

  • Online ISBN: 978-3-030-24907-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics