{"id":"https://openalex.org/W4415787314","doi":"https://doi.org/10.1002/spy2.70131","title":"A Lightweight and Secure Authentication Protocol With Blockchain\u2010Bound Device Tokens for Mobile Roaming in Edge Networks","display_name":"A Lightweight and Secure Authentication Protocol With Blockchain\u2010Bound Device Tokens for Mobile Roaming in Edge Networks","publication_year":2025,"publication_date":"2025-11-01","ids":{"openalex":"https://openalex.org/W4415787314","doi":"https://doi.org/10.1002/spy2.70131"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70131","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70131","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026084135","display_name":"Suprith Kumar K S","orcid":null},"institutions":[{"id":"https://openalex.org/I1336731492","display_name":"Electronics Corporation of India","ror":"https://ror.org/00axkns98","country_code":"IN","type":"government","lineage":["https://openalex.org/I1336731492"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Suprith Kumar K S","raw_affiliation_strings":["Dept. of Electronics and Communication Engineering BMSCE  Bengaluru India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Dept. of Electronics and Communication Engineering BMSCE  Bengaluru India","institution_ids":["https://openalex.org/I1336731492"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Akhila S","orcid":"https://orcid.org/0000-0002-9615-3153"},"institutions":[{"id":"https://openalex.org/I1336731492","display_name":"Electronics Corporation of India","ror":"https://ror.org/00axkns98","country_code":"IN","type":"government","lineage":["https://openalex.org/I1336731492"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Akhila S","raw_affiliation_strings":["Dept. of Electronics and Communication Engineering BMSCE  Bengaluru India"],"raw_orcid":"https://orcid.org/0000-0002-9615-3153","affiliations":[{"raw_affiliation_string":"Dept. of Electronics and Communication Engineering BMSCE  Bengaluru India","institution_ids":["https://openalex.org/I1336731492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038169735","display_name":"R. Poornima","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096602","display_name":"Global College","ror":"https://ror.org/00q24dt49","country_code":"CY","type":"education","lineage":["https://openalex.org/I4210096602"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Poornima R M","raw_affiliation_strings":["Dept. of Information Science and Engineering Global Academy of Technology  Bengaluru India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Dept. of Information Science and Engineering Global Academy of Technology  Bengaluru India","institution_ids":["https://openalex.org/I4210096602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059745111","display_name":"M Indushree","orcid":"https://orcid.org/0000-0002-5546-6049"},"institutions":[{"id":"https://openalex.org/I8977528","display_name":"Dr. Hari Singh Gour University","ror":"https://ror.org/01xapxe37","country_code":"IN","type":"education","lineage":["https://openalex.org/I8977528"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Indushree M","raw_affiliation_strings":["Dept. of CSE with Cyber Security Dayananda Sagar University  Bengaluru India"],"raw_orcid":"https://orcid.org/0000-0002-5546-6049","affiliations":[{"raw_affiliation_string":"Dept. of CSE with Cyber Security Dayananda Sagar University  Bengaluru India","institution_ids":["https://openalex.org/I8977528"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059745111"],"corresponding_institution_ids":["https://openalex.org/I8977528"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":1.3517,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86987861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.24650000035762787,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.24650000035762787,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.1695999950170517,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.15070000290870667,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.7706000208854675},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.557699978351593},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5479000210762024},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5303999781608582},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49149999022483826},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4632999897003174},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4465000033378601},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.3808000087738037},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.351500004529953}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8126999735832214},{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.7706000208854675},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6158000230789185},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.557699978351593},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5479000210762024},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5303999781608582},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49149999022483826},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4632999897003174},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4465000033378601},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4163999855518341},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.3808000087738037},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.351500004529953},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3416000008583069},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3398999869823456},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3359000086784363},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3352000117301941},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3203999996185303},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.31790000200271606},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2971999943256378},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.29490000009536743},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.29350000619888306},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.29190000891685486},{"id":"https://openalex.org/C82203111","wikidata":"https://www.wikidata.org/wiki/Q205936","display_name":"Mobile IP","level":3,"score":0.28360000252723694},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.2824000120162964},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.262800008058548},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.2612999975681305},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2590999901294708},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2540000081062317}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70131","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70131","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1992497332","https://openalex.org/W2791200528","https://openalex.org/W2990414390","https://openalex.org/W3016744450","https://openalex.org/W3038047225","https://openalex.org/W3038509227","https://openalex.org/W3101361680","https://openalex.org/W4214852989","https://openalex.org/W4286374875","https://openalex.org/W4296772527","https://openalex.org/W4307419931","https://openalex.org/W4313399985","https://openalex.org/W4317754097","https://openalex.org/W4319754797","https://openalex.org/W4366819049","https://openalex.org/W4380682691","https://openalex.org/W4385686669","https://openalex.org/W4387609334","https://openalex.org/W4394862758","https://openalex.org/W4396859925","https://openalex.org/W4399009664","https://openalex.org/W4402092451","https://openalex.org/W4402454188","https://openalex.org/W4404060917","https://openalex.org/W4405182942","https://openalex.org/W4410090097","https://openalex.org/W4412939625","https://openalex.org/W4413553614"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Lightweight":[1],"and":[2,22,43,60,94,108,117,131,142,151],"secure":[3],"authentication":[4,34],"is":[5,149],"a":[6,32,49,61],"fundamental":[7],"requirement":[8],"for":[9,153],"mobile":[10,137],"roaming":[11,69],"in":[12,16,156],"edge\u2010assisted":[13,157],"networks,":[14],"particularly":[15],"the":[17,23,71,80,89,121,126,147],"presence":[18],"of":[19,26],"resource":[20],"constraints":[21],"emerging":[24],"threat":[25],"quantum\u2010capable":[27],"adversaries.":[28],"This":[29],"paper":[30],"proposes":[31],"blockchain\u2010assisted":[33],"protocol":[35,127,148],"that":[36,125,146],"employs":[37],"post\u2010quantum":[38,102],"cryptographic":[39],"primitives":[40],"to":[41,64,79,91],"generate":[42],"validate":[44],"device\u2010bound":[45],"tokens.":[46],"During":[47],"registration,":[48],"Home":[50],"Agent":[51,82],"(HA)":[52],"issues":[53],"blockchain\u2010anchored":[54],"tokens":[55],"containing":[56],"signed":[57],"security":[58],"metadata":[59,78],"freshness":[62],"counter":[63],"prevent":[65],"replay":[66],"attacks.":[67,133],"In":[68],"scenarios,":[70],"Mobile":[72],"User":[73],"(MU)":[74],"selectively":[75],"discloses":[76],"token":[77],"Foreign":[81],"(FA),":[83],"which":[84],"verifies":[85],"its":[86],"authenticity":[87],"with":[88],"HA":[90],"enable":[92],"efficient":[93],"trustworthy":[95],"authentication.":[96],"A":[97],"hybrid":[98],"key":[99,103],"establishment":[100],"using":[101,120],"encapsulation":[104],"ensures":[105],"forward":[106],"secrecy":[107],"quantum\u2010resistant":[109],"confidentiality.":[110],"Formal":[111],"verification":[112],"through":[113],"BAN":[114],"logic":[115],"reasoning":[116],"automated":[118],"analysis":[119],"Scyther":[122],"tool":[123],"confirm":[124],"withstands":[128],"impersonation,":[129],"replay,":[130],"man\u2010in\u2010the\u2010middle":[132],"Experimental":[134],"evaluation":[135],"on":[136],"devices":[138],"demonstrates":[139],"low":[140],"computational":[141],"communication":[143],"overhead,":[144],"showing":[145],"practical":[150],"well\u2010suited":[152],"real\u2010world":[154],"deployment":[155],"mobility":[158],"environments.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-11-03T00:00:00"}
