Abstract
Authentication mechanisms are important security features for mobile operators and application providers. In addition to the primary authentication between user equipment and the mobile operator network, secondary authentication between the user and Data Networks owned by the application is introduced in the 5G system. However, the implementation of secondary authentication introduces some challenges to application providers, not only the cost but also the capability, which leaves space for improving. In this paper, we designed an authentication mechanism for applications based on blockchain. With this mechanism, mobile operators and the application providers are able to share authentication related information like authentication results, users’ identification, users’ attribute information, users’ reputation and users’ blacklists, etc. securely. As a result, some application providers could execute user access control without deploying their own authentication systems any more. In addition with the shared comprehensive user information, mobile operators and application providers can make more fine and intelligent user access control.
L. Ren—Architecture and process design of the combination of blockchain and 5g.
X. Huang—5g secondary authentication problem and demand analysis, proposal design.
H. Zhou—Guide the whole scheme and put forward optimization ideas.
B. Yang—Discussion on 5g secondary authentication solution based on blockchain Technology.
L. Su—Guide the experimental design of the scheme and plan the next work.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
3gpp 5g security. https://www.3gpp.org//news-events//3gpp-news//1975-sec-5g. Accessed 27 Oct 2021
3gpp tr 33.899: Study on the security aspects of the next generation system. Accessed 27 Oct 2021
3gpp ts 23.501 (v16.1.0): System architecture for the 5g system. Accessed 27 Oct 2021
3gpp ts 33.102 (v16.0.0): 3g security: security architecture. Accessed 27 Oct 2021
3gpp ts 33.501 (v16.4.0): Security architecture and procedures for 5g system. Accessed 27 Oct 2021
Hyperledger. http://www.hyperledger.org. Accessed 27 Oct 2021
Hyperledger fabric. http://github.com/hyperledger/fabric. Accessed 27 Oct 2021
Hyperledger fabric: [fab-12221] validator/committer refactor-hyperledger jira. https://jira.hyperledger.org/browse/FAB-12221?filter=12526. Accessed 27 Oct 2021
Ietf rfc 3748: Extensible authentication protocol (EAP). Accessed 27 Oct 2021
Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1–15 (2018)
Cachin, C., et al.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, vol. 310 (2016)
Gorenflo, C., Lee, S., Golab, L., Keshav, S.: FastFabric: Scaling hyperledger fabric to 20 000 transactions per second. Int. J. Netw. Manag. 30(5), e2099 (2020)
Huang, X., Yoshizawa, T., Baskaran, S.B.M.: Authentication mechanisms in the 5G system. J. ICT Standard. 61–78 (2021)
König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center BLOCKCHAINS: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. 10(3), 110–127 (2020)
Ranjan, S., Negi, A., Jain, H., Pal, B., Agrawal, H.: Network system design using hyperledger fabric: permissioned blockchain framework. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–6. IEEE (2019)
Ribalta, C.N., Lombard-Platet, M., Salinesi, C., Lafourcade, P.: Blockchain mirage or silver bullet? A requirements-driven comparative analysis of business and developers’ perceptions in the accountancy domain. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 12(1), 85–110 (2021)
Shih, C.S., Hsieh, W.Y., Kao, C.L.: Traceability for vehicular network real-time messaging based on blockchain technology. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 1–21 (2019)
Song, F., Ai, Z., Zhang, H., You, I., Li, S.: Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Ind. Inf. (2020)
Song, F., Ai, Z., Zhou, Y., You, I., Choo, K.K.R., Zhang, H.: Smart collaborative automation for receive buffer control in multipath industrial networks. IEEE Trans. Industr. Inf. 16(2), 1385–1394 (2019)
Song, F., Li, L., You, I., Zhang, H.: Enabling heterogeneous deterministic networks with smart collaborative theory. IEEE Netw. 35(3), 64–71 (2021)
Tu, Z., Zhou, H., Li, K., Li, G.: DCTG: degree constrained topology generation algorithm for software-defined satellite network. J. Internet Serv. Inf. Secur. 9(4), 49–58 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ren, L., Huang, X., Zhou, H., Yang, B., Su, L. (2022). A Blockchain-Based Authentication Scheme for 5G Applications. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_12
Download citation
DOI: https://doi.org/10.1007/978-981-16-9576-6_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-9575-9
Online ISBN: 978-981-16-9576-6
eBook Packages: Computer ScienceComputer Science (R0)