{"id":"https://openalex.org/W4400728348","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592452","title":"A Blockchain-assisted Group Handover Authentication Protocol for 5G Wireless Networks","display_name":"A Blockchain-assisted Group Handover Authentication Protocol for 5G Wireless Networks","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4400728348","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592452"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc61514.2024.10592452","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc61514.2024.10592452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100588893","display_name":"Ronghao Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I102345215","display_name":"Xihua University","ror":"https://ror.org/04gwtvf26","country_code":"CN","type":"education","lineage":["https://openalex.org/I102345215"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ronghao Ma","raw_affiliation_strings":["Xihua University,School of Computer and Software Engineering,Sichuan,China"],"affiliations":[{"raw_affiliation_string":"Xihua University,School of Computer and Software Engineering,Sichuan,China","institution_ids":["https://openalex.org/I102345215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101604033","display_name":"Jianhong Zhou","orcid":"https://orcid.org/0000-0002-4594-6196"},"institutions":[{"id":"https://openalex.org/I102345215","display_name":"Xihua University","ror":"https://ror.org/04gwtvf26","country_code":"CN","type":"education","lineage":["https://openalex.org/I102345215"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhong Zhou","raw_affiliation_strings":["Xihua University,School of Computer and Software Engineering,Sichuan,China"],"affiliations":[{"raw_affiliation_string":"Xihua University,School of Computer and Software Engineering,Sichuan,China","institution_ids":["https://openalex.org/I102345215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["Qatar University,College of Engineering,Qatar"],"affiliations":[{"raw_affiliation_string":"Qatar University,College of Engineering,Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100588893"],"corresponding_institution_ids":["https://openalex.org/I102345215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10994449,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"78","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9580000042915344,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9476000070571899,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7968415021896362},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7382321357727051},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7125811576843262},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.6929227113723755},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5852624773979187},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.49997425079345703},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4996223449707031},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4495111107826233},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4248349070549011},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2724785804748535},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15557244420051575},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.07373639941215515},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.04727208614349365}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7968415021896362},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7382321357727051},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7125811576843262},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.6929227113723755},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5852624773979187},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.49997425079345703},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4996223449707031},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4495111107826233},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4248349070549011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2724785804748535},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15557244420051575},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.07373639941215515},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.04727208614349365},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc61514.2024.10592452","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc61514.2024.10592452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1603878273","https://openalex.org/W2029693536","https://openalex.org/W2164461951","https://openalex.org/W2985336933","https://openalex.org/W2996971090","https://openalex.org/W3129000488","https://openalex.org/W4205745215","https://openalex.org/W4283010965","https://openalex.org/W4291653228"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2547137208","https://openalex.org/W2061637199","https://openalex.org/W2040161614"],"abstract_inverted_index":{"The":[0,94,137],"fifth-generation":[1],"(5G)":[2],"wireless":[3],"cellular":[4],"network":[5,71],"with":[6],"its":[7,149],"high-density":[8],"connectivity":[9],"enables":[10],"the":[11,31,100,118,157,163],"support":[12],"of":[13,16,38,92,115,120,170],"massive":[14,21],"Internet":[15],"Things":[17],"(IoT)":[18],"applications,":[19],"where":[20],"machine-type":[22],"communication":[23,28,173],"(MTC)":[24],"is":[25,166],"a":[26,36,44,90],"core":[27,66],"scenario":[29],"in":[30,62,168],"IoT":[32],"domain.":[33],"However,":[34],"when":[35],"group":[37,91,132],"MTC":[39],"devices":[40],"(MTCD)":[41],"simultaneously":[42,124],"access":[43,64],"new":[45],"target":[46],"base":[47,108,135],"station,":[48],"much":[49],"more":[50],"frequent":[51],"mutual":[52,126],"authentication":[53,83,101,127],"processes":[54],"take":[55],"place":[56],"leading":[57],"to":[58,98,106],"high":[59],"signaling":[60],"overheads":[61],"both":[63],"and":[65,80,123,128,134,172],"networks,":[67],"thus":[68],"reducing":[69],"overall":[70],"efficiency.":[72],"In":[73],"this":[74],"paper,":[75],"we":[76],"propose":[77],"an":[78],"efficient":[79,167],"secure":[81],"handover":[82],"protocol":[84,95,139,165],"supported":[85],"by":[86,144],"blockchain":[87,97],"technology":[88],"for":[89],"MTCD.":[93],"leverages":[96],"decentralize":[99],"function":[102],"from":[103],"centralized":[104],"servers":[105],"all":[107],"stations.":[109,136],"It":[110],"can":[111],"prevent":[112],"single":[113],"points":[114],"failure,":[116],"increase":[117],"difficulty":[119],"DDoS":[121],"attacks,":[122],"achieve":[125],"key":[129],"negotiation":[130],"between":[131],"MTCD":[133],"proposed":[138,164],"has":[140],"been":[141],"formally":[142],"evaluated":[143],"using":[145],"Scyther":[146],"tools":[147],"demonstrating":[148],"resilience":[150],"against":[151],"major":[152],"typical":[153],"malicious":[154],"attacks.":[155],"Furthermore,":[156],"performance":[158],"evaluation":[159],"results":[160],"show":[161],"that":[162],"terms":[169],"computation":[171],"costs.":[174]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
