Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/161311
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChow, Man Chunen_US
dc.contributor.authorMa, Maodeen_US
dc.date.accessioned2022-08-24T07:11:18Z-
dc.date.available2022-08-24T07:11:18Z-
dc.date.issued2022-
dc.identifier.citationChow, M. C. & Ma, M. (2022). A secure blockchain-based authentication and key agreement scheme for 3GPP 5G networks. Sensors, 22(12), 4525-. https://dx.doi.org/10.3390/s22124525en_US
dc.identifier.issn1424-8220en_US
dc.identifier.urihttps://hdl.handle.net/10356/161311-
dc.description.abstractThe futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security. To ensure the security of the network, the Third Generation Partnership Project (3GPP) has standardized the 5G Authentication and Key Agreement (AKA) protocol for mutually authenticating user equipment (UE), base stations, and the core network. However, it has been found that 5G-AKA is vulnerable to many attacks, including linkability attacks, denial-of-service (DoS) attacks, and distributed denial-of-service (DDoS) attacks. To address these security issues and improve the robustness of the 5G network, in this paper, we introduce the Secure Blockchain-based Authentication and Key Agreement for 5G Networks (5GSBA). Using blockchain as a distributed database, our 5GSBA decentralizes authentication functions from a centralized server to all base stations. It can prevent single-point-of-failure and increase the difficulty of DDoS attacks. Moreover, to ensure the data in the blockchain cannot be used for device impersonation, our scheme employs the one-time secret hash function as the device secret key. Furthermore, our 5GSBA can protect device anonymity by mandating the encryption of device identities with Subscription Concealed Identifiers (SUCI). Linkability attacks are also prevented by deprecating the sequence number with Elliptic Curve Diffie-Hellman (ECDH). We use Burrows-Abadi-Needham (BAN) logic and the Scyther tool to formally verify our protocol. The security analysis shows that 5GSBA is superior to 5G-AKA in terms of perfect forward secrecy, device anonymity, and mutual Authentication and Key Agreement (AKA). Additionally, it effectively deters linkability attacks, replay attacks, and most importantly, DoS and DDoS attacks. Finally, the performance evaluation shows that 5GSBA is efficient for both UEs and base stations with reasonably low computational costs and energy consumption.en_US
dc.language.isoenen_US
dc.relation.ispartofSensorsen_US
dc.rights© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/).en_US
dc.subjectEngineering::Electrical and electronic engineeringen_US
dc.titleA secure blockchain-based authentication and key agreement scheme for 3GPP 5G networksen_US
dc.typeJournal Articleen
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.identifier.doi10.3390/s22124525-
dc.description.versionPublished versionen_US
dc.identifier.pmid35746307-
dc.identifier.scopus2-s2.0-85132070081-
dc.identifier.issue12en_US
dc.identifier.volume22en_US
dc.identifier.spage4525en_US
dc.subject.keywords5Gen_US
dc.subject.keywordsBlockchainen_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:EEE Journal Articles
Files in This Item:
File Description SizeFormat 
sensors-22-04525-v2.pdf3.29 MBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 20

13
Updated on Jul 21, 2024

Web of ScienceTM
Citations 50

3
Updated on Oct 27, 2023

Page view(s)

102
Updated on Jul 20, 2024

Download(s) 50

47
Updated on Jul 20, 2024

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.