Skip to main content
Log in

A Blockchain-Based Authentication Scheme for 5G-Enabled IoT

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

5G cellular network is becoming a preferred technology for communication in deployments of the Internet of Things (IoT). However, 5G cellular network is essentially designed for cellular communication. Therefore, there are several areas in IoT over 5G cellular network, where there is scope for further improvement. One such area is development of efficient security mechanisms for authentication of the IoT devices. The authentication protocol currently being used in 5G cellular network maintains the security credentials of the devices at the home network in a centralised manner. Therefore, every time a device needs to be authenticated, the home network has to be communicated. However, considering the IoT scenario where there is large scale deployment of devices, frequent communication with the home network may result in increased communication latency. In this paper, we propose an authentication scheme where security credentials of the IoT devices are stored in a decentralized way using blockchain technology. The scheme is found to be safe and secured, through an informal and a formal security analysis using scyther tool. The smart contracts used in the scheme, when deployed in the ethereum test network, are also found to be efficient. Through experimental performance analysis, the scheme is found to have attained reduced communication latency compared to the existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Reyna, A., Martín, C., Chen, J., Soler, E., Díaz, M.: On blockchain and its integration with IoT. Challenges and opportunities. Futur. Gener. Comput. Syst. 88, 173–190 (2018)

    Article  Google Scholar 

  2. Vailshery, L.S.: IoT and non-IoT connections worldwide 2010–2025. https://statista.com/statistics/1101442/iot-number-of-connecteddevices-worldwide/. Accessed 20 Aug 2021

  3. Shafique, K., Khawaja, B.A., Sabir, F., Qazi, S., Mustaqim, M.: Internet of things (iot) for next-generation smart systems: a review of current challenges, future trends and prospects for emerging 5g-iot scenarios. IEEE Access 8, 23022–23040 (2020)

    Article  Google Scholar 

  4. StarDust: 5G and its impact on the Internet of Things. https://stardust-testing.com/en/5g-and-impact-on-iots/. Accessed 20 Aug 2021

  5. Vakilinia, S., Elbiaze, H.: Latency control of icn enabled 5g networks. J. Netw. Syst. Manage. 28(1), 81–107 (2020)

    Article  Google Scholar 

  6. Rao, S.K., Prasad, R.: Impact of 5g Technologies on Smart City Implementation, vol. 100, pp. 161–176. Springer, Berlin (2018)

  7. Kota, S., Giambene, G.: Satellite 5g: Iot use case for rural areas applications. In: Proceedings of the Eleventh International Conference on Advances in Satellite and Space Communications-SPACOMM, pp. 24–28 (2019)

  8. Torres Vega, M., Liaskos, C., Abadal, S., Papapetrou, E., Jain, A., Mouhouche, B., Kalem, G., Ergüt, S., Mach, M., Sabol, T., et al.: Immersive interconnected virtual and augmented reality: a 5g and iot perspective. J. Netw. Syst. Manage. 28(4), 796–826 (2020)

    Article  Google Scholar 

  9. Masood, A., Gupta, A.: Enhanced logistics security techniques using iot and 5g. In: 2020 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), pp. 7–14. IEEE (2020)

  10. Advantages of 5G and how will benifit IOT. https://iotsworldcongress.com/advantatges-of-5g-and-how-will-benefit-iot/. Accessed 20 Aug 2021

  11. Kumar, N.M., Mallick, P.K.: Blockchain technology for security issues and challenges in IoT. Proc. Comput. Sci. 132, 1815–1823 (2018)

    Article  Google Scholar 

  12. Rodrigues, B., Scheid, E., Killer, C., Franco, M., Stiller, B.: Blockchain signaling system (bloss): cooperative signaling of distributed denial-of-service attacks. J. Netw. Syst. Manage. 28(4), 953–989 (2020)

    Article  Google Scholar 

  13. Khan, M.A., Salah, K.: Iot security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  14. Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., Janicke, H.: Blockchain technologies for the internet of things: research issues and challenges. IEEE Internet Things J. 6(2), 2188–2204 (2018)

    Article  Google Scholar 

  15. Haris, R.M., Al-Maadeed, S.: Integrating blockchain technology in 5g enabled iot: A review. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 367–371. IEEE (2020)

  16. Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618–623. IEEE (2017)

  17. Jia, X., Hu, N., Su, S., Yin, S., Zhao, Y., Cheng, X., Zhang, C.: Irba: an identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4), 634 (2020)

    Article  Google Scholar 

  18. Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M., Pustišek, M.: Towards decentralized iot security enhancement: a blockchain approach. Comput. Electric. Eng. 72, 266–273 (2018)

    Article  Google Scholar 

  19. Albalawi, K., Azim, M.M.A.: Cloud-based iot device authentication scheme using blockchain. In: 2019 IEEE Global Conference on Internet of Things (GCIoT), pp. 1–7. IEEE (2019)

  20. Chen, Z., Chen, S., Xu, H., Hu, B.: A security authentication scheme of 5g ultra-dense network based on block chain. IEEE Access 6, 55372–55379 (2018)

    Article  Google Scholar 

  21. Chow, M.C., Ma, M.: A blockchain-enabled 5g authentication scheme against dos attacks. In: Journal of Physics: Conference Series, vol. 1812, p. 012030. IOP Publishing (2021)

  22. Yang, H., Zheng, H., Zhang, J., Wu, Y., Lee, Y., Ji, Y.: Blockchain-based trusted authentication in cloud radio over fiber network for 5g. In: 2017 16th International Conference on Optical Communications and Networks (ICOCN), pp. 1–3. IEEE (2017)

  23. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Busin. Rev., 21260 (2008)

  24. Mingxiao, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., Qijun, C.: A review on consensus algorithm of blockchain. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2567–2572. IEEE (2017)

  25. Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16 (2016)

  26. Li, W., Andreina, S., Bohli, J.-M., Karame, G.: Securing proof-of-stake blockchain protocols. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp. 297–315. Springer (2017)

  27. Irresberger, F., John, K., Mueller, P., Saleh, F.: The Public Blockchain Ecosystem: An Empirical Analysis. NYU Stern School of Business (2021)

  28. Kwak, K.H., Kong, J.T., Cho, S.I., Phuong, H.T., Gim, G.Y.: A study on the design of efficient private blockchain. In: International Conference on Computational Science/Intelligence & Applied Informatics, pp. 93–121. Springer (2018)

  29. Dib, O., Brousmiche, K.-L., Durand, A., Thea, E., Hamida, E.B.: Consortium blockchains: overview, applications and challenges. Int. J. Adv. Telecommun. 11(1&2), 51–64 (2018)

    Google Scholar 

  30. Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al.: Blockchain technology: Beyond bitcoin. Appl. Innov. 2(6–10), 71 (2016)

    Google Scholar 

  31. Dai, Y., Xu, D., Maharjan, S., Chen, Z., He, Q., Zhang, Y.: Blockchain and deep reinforcement learning empowered intelligent 5g beyond. IEEE Netw. 33(3), 10–17 (2019)

    Article  Google Scholar 

  32. Mohanta, B.K., Sahoo, A., Patel, S., Panda, S.S., Jena, D., Gountia, D.: Decauth: Decentralized authentication scheme for iot device using ethereum blockchain. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON), pp. 558–563. IEEE (2019)

  33. Khalid, U., Asim, M., Baker, T., Hung, P.C., Tariq, M.A., Rafferty, L.: A decentralized lightweight blockchain-based authentication mechanism for iot systems. Clust. Comput. 23(3), 2067–2087 (2020)

    Article  Google Scholar 

  34. Goswami, H., Choudhury, H.: Security of iot in 5g cellular networks: a review of current status, challenges and future directions. Int. J. Commun. Netw. Inf. Secur. 13(2), 278–289 (2021)

    Google Scholar 

  35. Gupta, N., Sharma, S., Juneja, P.K., Garg, U.: Open research challenges and blockchain based security solution for 5g enabled iot. In: International Conference on Advanced Informatics for Computing Research, pp. 111–120. Springer (2020)

  36. Dinesh, B., Kavya, B., Sivakumar, D., Ahmed, M.R.: Conforming test of blockchain for 5g enabled iot. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1153–1157. IEEE (2019)

  37. Jia, X., Hu, N., Yin, S., Zhao, Y., Zhang, C., Cheng, X.: A2 chain: a blockchain-based decentralized authentication scheme for 5g-enabled iot. Mob. Inf. Syst. 2020 (2020)

  38. Hewa, T., Bracken, A., Ylianttila, M., Liyanage, M.: Blockchain-based automated certificate revocation for 5g iot. In: ICC 2020–2020 IEEE International Conference on Communications (ICC), pp. 1–7. IEEE (2020)

  39. Vivekanandan, M., et al.: Bidapsca5g: Blockchain based internet of things (iot) device to device authentication protocol for smart city applications using 5g technology. Peer-to-Peer Netw. Appl. 14(1), 403–419 (2021)

    Article  Google Scholar 

  40. Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5g-enabled iot for industrial automation: a systematic review, solutions, and challenges. Mech. Syst. Signal Process. 135, 106382 (2020)

    Article  Google Scholar 

  41. Dewey, J.N., Hill, R., Plasencia, R.: Blockchain and 5g-enabled internet of things (iot) will redefine supply chains and trade finance. Proc. Secured Lender, 43–45 (2018)

  42. 3GPP, Security architecture and procedures for 5G System, Tech. report 33.501, 3rd Generation Partnership Project (3GPP), (2019). https://www.3gpp.org/DynaReport/33501.htm Accessed 20 Aug 2021

  43. 3GPP: About 3GPP. https://3gpp.org/about-3gpp/. Accessed 20 Aug 2021

  44. 3GPP: System Architecture for the 5G System. TS 23.501, 3rd Generation Partnership Project (3GPP) (2019). https://www.3gpp.org/DynaReport/23501.htm

  45. Choudhury, H.: Hashxor: a lightweight scheme for identity privacy of iot devices in 5g mobile network. Comput. Netw. 186, 107753 (2021)

    Article  Google Scholar 

  46. Behrad, S., Bertin, E., Tuffin, S., Crespi, N.: A new scalable authentication and access control mechanism for 5g-based iot. Futur. Gener. Comput. Syst. 108, 46–61 (2020)

    Article  Google Scholar 

  47. Haddad, Z., Fouda, M.M., Mahmoud, M., Abdallah, M.: Blockchain-based authentication for 5g networks. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 189–194. IEEE (2020)

  48. Singh, K., Heulot, N., Hamida, E.B.: Towards anonymous, unlinkable, and confidential transactions in blockchain. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1642–1649. IEEE (2018)

  49. Wu Jr, W.: An efficient and effective decentralized anonymous voting system. arXiv:1804.06674 (2018)

  50. Mohanta, B.K., Panda, S.S., Jena, D.: An overview of smart contract and use cases in blockchain technology. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–4. IEEE (2018)

  51. 3GPP: Study on the security aspects of the next generation system. TS 33.899, 3rd Generation Partnership Project(3GPP) (2017). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3045

  52. 3GPP: 5G Security Assurance Specification (SCAS); Access and Mobility management Function (AMF). TS 33.512, 3rd Generation Partnership Project (3GPP) (2020). https://www.3gpp.org/DynaReport/33512.htm

  53. Cremers, C.: The Scyther Tool. https://people.cispa.io/cas.cremers/scyther/. Accessed 22 Nov 2021

  54. Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners, pp. 50–60 (2009)

  55. Riadi, I., Umar, R., Busthomi, I., Muhammad, A.W.: Block-hash of blockchain framework against man-in-the-middle attacks. Reg. J. Limiah. Teknol. Sist. Inf. 8, 1–9 (2021)

    Article  Google Scholar 

  56. Cremers, C.J.: The scyther tool: Verification, falsification, and analysis of security protocols. In: International Conference on Computer Aided Verification, pp. 414–418. Springer (2008)

  57. Casimiro, A., Lemos, R., Gacek, C.: Operational semantics and verification of security protocols

  58. Lowe, G.: A hierarchy of authentication specifications. In: Proceedings 10th Computer Security Foundations Workshop, pp. 31–43. IEEE (1997)

  59. Ethereum. https://ethereum.org/en/. Accessed 20 Aug 2021

  60. Remix IDE. https://remix.ethereum.org/. Accessed 20 Aug 2021

  61. Rinkeby. https://rinkeby.etherscan.io/. Accessed 20 Aug 2021

  62. MetaMask. https://metamask.io/. Accessed 20 Aug 2021

  63. Zhang, Y., Ren, F., Wu, A., Zhang, T., Cao, J., Zheng, D.: Certificateless multi-party authenticated encryption for nb-iot terminals in 5g networks. IEEE Access 7, 114721–114730 (2019)

    Article  Google Scholar 

  64. 3GPP: Security architecture and procedures for 5G System . TS 33.501, 3rd Generation Partnership Project (3GPP) (2021). https://www.3gpp.org/DynaReport/33501.htm

  65. Cho, S., Yeom, C., Won, Y.: Implementation of efficient 5g aka protocol for light-weight environment. Sustainability 13(16), 8982 (2021)

    Article  Google Scholar 

  66. Cao, J., Yu, P., Ma, M., Gao, W.: Fast authentication and data transfer scheme for massive nb-iot devices in 3g pp 5g network. IEEE Internet Things J. 6(2), 1561–1575 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

The work presented in this paper is funded by Cyber Security R&D Division, Ministry of Electronics and Information Technology (MeitY), Government of India (AAA-22/2/2021-CSRD-MeitY).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiten Choudhury.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Goswami, B., Choudhury, H. A Blockchain-Based Authentication Scheme for 5G-Enabled IoT. J Netw Syst Manage 30, 61 (2022). https://doi.org/10.1007/s10922-022-09680-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-022-09680-6

Keywords

Navigation