4.7 Article

Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks

期刊

COMPUTER COMMUNICATIONS
卷 200, 期 -, 页码 1-16

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2022.12.026

关键词

Mutual authentication; Blockchain; Smart-contracts; Mobility network; Security

向作者/读者索取更多资源

Designing a secure and efficient authentication protocol for mobility network is crucial and challenging due to network attacks in seamless roaming of mobile users and broadcast nature of communication. The proposed Mobile-Chain is a secure blockchain-based authentication system that protects user privacy and provides provable security. Its implementation on the ethereum blockchain platform using smart contracts shows robustness against security threats in mobility networks.
Designing a secure and efficient authentication protocol is crucial and challenging in the mobility network. Due to the seamless roaming of mobile users over multiple foreign agents and the broadcast nature of the communication channel, the mobile networks are often exposed to several network attacks. To achieve perfect authentication and secure communication among mobility entities like MU (Mobile User), FA (Foreign Agent) and HA (Home Agent), the researchers have proposed numerous authentication protocols in the past. However, the existing protocols for the mobility environments are insufficient to address the fundamental security concerns and an adversary can impersonate the mobile user at anytime. Thus, we propose Mobile-Chain, a secure blockchain-based authentication system for mobility environments. The proposed Mobile-Chain is de-signed to protect user privacy and guarantees provable security like authentication, anonymity, untraceability, confidentiality, data integrity, and decentralization. The implementation of the security framework has been done on the ethereum blockchain platform using smart contracts written in a solidity programming language. The security analysis reveals that Mobile-Chain is robust against various security threats to which mobility networks are vulnerable. Besides, the authentication framework has been measured through a formal security verification tool known as Automated Validation of Internet Security Protocol and Application (AVISPA). Notably, the performance evaluation of the proposed protocol proves that it maintains performance gain, computationally efficient, and implementable in resource-limited wireless and mobility environments.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据