Skip to main content

A Blockchain-Based Authentication Scheme for 5G Applications

  • Conference paper
  • First Online:
  • 829 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1544))

Abstract

Authentication mechanisms are important security features for mobile operators and application providers. In addition to the primary authentication between user equipment and the mobile operator network, secondary authentication between the user and Data Networks owned by the application is introduced in the 5G system. However, the implementation of secondary authentication introduces some challenges to application providers, not only the cost but also the capability, which leaves space for improving. In this paper, we designed an authentication mechanism for applications based on blockchain. With this mechanism, mobile operators and the application providers are able to share authentication related information like authentication results, users’ identification, users’ attribute information, users’ reputation and users’ blacklists, etc. securely. As a result, some application providers could execute user access control without deploying their own authentication systems any more. In addition with the shared comprehensive user information, mobile operators and application providers can make more fine and intelligent user access control.

L. Ren—Architecture and process design of the combination of blockchain and 5g.

X. Huang—5g secondary authentication problem and demand analysis, proposal design.

H. Zhou—Guide the whole scheme and put forward optimization ideas.

B. Yang—Discussion on 5g secondary authentication solution based on blockchain Technology.

L. Su—Guide the experimental design of the scheme and plan the next work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. 3gpp 5g security. https://www.3gpp.org//news-events//3gpp-news//1975-sec-5g. Accessed 27 Oct 2021

  2. 3gpp tr 33.899: Study on the security aspects of the next generation system. Accessed 27 Oct 2021

    Google Scholar 

  3. 3gpp ts 23.501 (v16.1.0): System architecture for the 5g system. Accessed 27 Oct 2021

    Google Scholar 

  4. 3gpp ts 33.102 (v16.0.0): 3g security: security architecture. Accessed 27 Oct 2021

    Google Scholar 

  5. 3gpp ts 33.501 (v16.4.0): Security architecture and procedures for 5g system. Accessed 27 Oct 2021

    Google Scholar 

  6. Hyperledger. http://www.hyperledger.org. Accessed 27 Oct 2021

  7. Hyperledger fabric. http://github.com/hyperledger/fabric. Accessed 27 Oct 2021

  8. Hyperledger fabric: [fab-12221] validator/committer refactor-hyperledger jira. https://jira.hyperledger.org/browse/FAB-12221?filter=12526. Accessed 27 Oct 2021

  9. Ietf rfc 3748: Extensible authentication protocol (EAP). Accessed 27 Oct 2021

    Google Scholar 

  10. Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)

    Google Scholar 

  11. Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1–15 (2018)

    Google Scholar 

  12. Cachin, C., et al.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, vol. 310 (2016)

    Google Scholar 

  13. Gorenflo, C., Lee, S., Golab, L., Keshav, S.: FastFabric: Scaling hyperledger fabric to 20 000 transactions per second. Int. J. Netw. Manag. 30(5), e2099 (2020)

    Article  Google Scholar 

  14. Huang, X., Yoshizawa, T., Baskaran, S.B.M.: Authentication mechanisms in the 5G system. J. ICT Standard. 61–78 (2021)

    Google Scholar 

  15. König, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center BLOCKCHAINS: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. 10(3), 110–127 (2020)

    Google Scholar 

  16. Ranjan, S., Negi, A., Jain, H., Pal, B., Agrawal, H.: Network system design using hyperledger fabric: permissioned blockchain framework. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1–6. IEEE (2019)

    Google Scholar 

  17. Ribalta, C.N., Lombard-Platet, M., Salinesi, C., Lafourcade, P.: Blockchain mirage or silver bullet? A requirements-driven comparative analysis of business and developers’ perceptions in the accountancy domain. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 12(1), 85–110 (2021)

    Google Scholar 

  18. Shih, C.S., Hsieh, W.Y., Kao, C.L.: Traceability for vehicular network real-time messaging based on blockchain technology. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 1–21 (2019)

    Google Scholar 

  19. Song, F., Ai, Z., Zhang, H., You, I., Li, S.: Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Ind. Inf. (2020)

    Google Scholar 

  20. Song, F., Ai, Z., Zhou, Y., You, I., Choo, K.K.R., Zhang, H.: Smart collaborative automation for receive buffer control in multipath industrial networks. IEEE Trans. Industr. Inf. 16(2), 1385–1394 (2019)

    Article  Google Scholar 

  21. Song, F., Li, L., You, I., Zhang, H.: Enabling heterogeneous deterministic networks with smart collaborative theory. IEEE Netw. 35(3), 64–71 (2021)

    Article  Google Scholar 

  22. Tu, Z., Zhou, H., Li, K., Li, G.: DCTG: degree constrained topology generation algorithm for software-defined satellite network. J. Internet Serv. Inf. Secur. 9(4), 49–58 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lanfang Ren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ren, L., Huang, X., Zhou, H., Yang, B., Su, L. (2022). A Blockchain-Based Authentication Scheme for 5G Applications. In: You, I., Kim, H., Youn, TY., Palmieri, F., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2021. Communications in Computer and Information Science, vol 1544. Springer, Singapore. https://doi.org/10.1007/978-981-16-9576-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-9576-6_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-9575-9

  • Online ISBN: 978-981-16-9576-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics