{"id":"https://openalex.org/W4312417810","doi":"https://doi.org/10.1109/jiot.2022.3223223","title":"XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets","display_name":"XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets","publication_year":2022,"publication_date":"2022-11-18","ids":{"openalex":"https://openalex.org/W4312417810","doi":"https://doi.org/10.1109/jiot.2022.3223223"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3223223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3223223","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100734754","display_name":"Mingjun Wang","orcid":"https://orcid.org/0000-0002-1020-3915"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingjun Wang","raw_affiliation_strings":["State Key Laboratory on Integrated Services Networks, School of Telecommunications Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory on Integrated Services Networks, School of Telecommunications Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026715321","display_name":"Dongsheng Zhao","orcid":"https://orcid.org/0000-0001-8966-9218"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongsheng Zhao","raw_affiliation_strings":["State Key Laboratory on Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory on Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078219471","display_name":"Zheng Yan","orcid":"https://orcid.org/0000-0002-9697-2108"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Yan","raw_affiliation_strings":["State Key Laboratory on Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory on Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007464615","display_name":"Haiguang Wang","orcid":"https://orcid.org/0000-0003-0796-725X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haiguang Wang","raw_affiliation_strings":["Shield Lab., Singapore Research Center, Huawei Technologies, The Signature, Singapore"],"affiliations":[{"raw_affiliation_string":"Shield Lab., Singapore Research Center, Huawei Technologies, The Signature, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053806943","display_name":"Tieyan Li","orcid":"https://orcid.org/0000-0003-4688-2697"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tieyan Li","raw_affiliation_strings":["Shield Lab., Singapore Research Center, Huawei Technologies, The Signature, Singapore"],"affiliations":[{"raw_affiliation_string":"Shield Lab., Singapore Research Center, Huawei Technologies, The Signature, Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100734754"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":3.283,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.92412883,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"10","issue":"7","first_page":"5962","last_page":"5976"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8329479694366455},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7686821222305298},{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.6628333330154419},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.535452127456665},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4990103244781494},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.466242253780365},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4603246748447418},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.44910547137260437},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.41839125752449036},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34833940863609314},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.2677820026874542},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1933344602584839},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.15856078267097473},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12287378311157227}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8329479694366455},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7686821222305298},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.6628333330154419},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.535452127456665},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4990103244781494},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.466242253780365},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4603246748447418},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.44910547137260437},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.41839125752449036},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34833940863609314},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2677820026874542},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1933344602584839},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.15856078267097473},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12287378311157227}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3223223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3223223","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2109692742","display_name":null,"funder_award_id":"2019M663631","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G3544433515","display_name":null,"funder_award_id":"62002273","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3896720349","display_name":null,"funder_award_id":"62072351","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G673329116","display_name":null,"funder_award_id":"B16037","funder_id":"https://openalex.org/F4320327912","funder_display_name":"Higher Education Discipline Innovation Project"},{"id":"https://openalex.org/G7744054328","display_name":null,"funder_award_id":"XJS220104","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322183","display_name":"Huawei Technologies","ror":"https://ror.org/00cmhce21"},{"id":"https://openalex.org/F4320327912","display_name":"Higher Education Discipline Innovation Project","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1592174611","https://openalex.org/W2010939995","https://openalex.org/W2029090942","https://openalex.org/W2029693536","https://openalex.org/W2054692642","https://openalex.org/W2056455477","https://openalex.org/W2131353907","https://openalex.org/W2227653143","https://openalex.org/W2343448572","https://openalex.org/W2770215151","https://openalex.org/W2786254459","https://openalex.org/W2846593596","https://openalex.org/W2902632384","https://openalex.org/W2946018107","https://openalex.org/W2960870100","https://openalex.org/W2962972515","https://openalex.org/W2968746919","https://openalex.org/W2971046657","https://openalex.org/W3010858269","https://openalex.org/W3084387290","https://openalex.org/W4210268633"],"related_works":["https://openalex.org/W2756697477","https://openalex.org/W2140125353","https://openalex.org/W2760405630","https://openalex.org/W2116234565","https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2619897385","https://openalex.org/W2364805998","https://openalex.org/W2963069143","https://openalex.org/W106082050"],"abstract_inverted_index":{"Fifth":[0],"generation":[1],"(5G)":[2],"networks":[3,35,105,130],"are":[4,67],"highly":[5],"heterogeneous,":[6],"with":[7],"ultradense":[8,92,128],"base":[9],"stations":[10],"(BSs),":[11],"due":[12],"to":[13,39,71,111,157],"the":[14,21,28,48,75,78,95,98,134,159,239,244],"low":[15],"penetration":[16],"of":[17,23,33,50,80,100,136,165,243],"millimeter":[18],"waves":[19],"and":[20,31,63,120,127,151,170,173,185,192,214,217,227,234,241],"availability":[22],"different":[24,57],"access":[25,61],"technologies.":[26],"However,":[27],"continuous":[29],"heterogeneity":[30],"densification":[32],"5G":[34,129,138,196],"pose":[36],"great":[37],"challenges":[38],"network":[40,58,139],"security,":[41],"especially":[42],"for":[43,125,189],"user":[44,51,60,211,225],"mobility":[45],"support.":[46],"In":[47,177],"process":[49],"handover":[52,81,112,122,161,194],"between":[53,56,210],"BSs":[54],"or":[55],"domains,":[59],"authentication":[62,82,123,162,187],"security":[64,101,169,232,240],"session":[65],"establishment":[66],"far":[68],"riskier":[69],"compared":[70],"4G":[72],"networks.":[73],"On":[74,94],"one":[76],"hand,":[77,97],"overhead":[79],"increases":[83],"significantly":[84],"as":[85],"handovers":[86],"become":[87],"more":[88],"frequent":[89],"in":[90,103,195],"an":[91],"network.":[93],"other":[96],"differentiation":[99],"schemes":[102],"heterogeneous":[104,126],"(HetNets)":[106],"poses":[107],"a":[108,116,183],"big":[109],"challenge":[110],"authentication.":[113],"Successfully":[114],"designing":[115],"secure,":[117],"privacy":[118,171,229],"preserving,":[119],"efficient":[121],"protocol":[124,188,203],"would":[131],"substantially":[132],"expand":[133],"prospects":[135],"future":[137],"applications.":[140],"Although":[141],"numerous":[142],"solutions":[143],"(e.g.,":[144],"challenge-response-based,":[145],"public":[146],"key":[147,208],"cryptography-based,":[148],"physical-layer":[149],"information-based,":[150],"blockchain-based":[152],"solutions)":[153],"have":[154],"been":[155],"proposed":[156,202,245],"solve":[158],"cross-domain":[160],"problem,":[163],"most":[164],"them":[166],"surfer":[167],"from":[168],"vulnerabilities":[172],"unreasonable":[174],"performance":[175,236],"overhead.":[176],"this":[178],"article,":[179],"we":[180],"propose":[181],"XAuth,":[182],"secure":[184],"privacy-preserving":[186],"both":[190],"intradomain":[191],"interdomain":[193],"HetNets":[197],"based":[198],"on":[199],"blockchain.":[200],"The":[201],"can":[204],"achieve":[205],"mutual":[206],"authentication,":[207],"agreement":[209],"equipment":[212],"(UE)":[213],"target":[215],"network,":[216],"is":[218],"characterized":[219],"by":[220],"forward":[221],"secrecy,":[222,224],"backward":[223],"anonymity,":[226],"conditional":[228],"preservation.":[230],"Formal":[231],"analysis":[233],"comprehensive":[235],"evaluation":[237],"demonstrate":[238],"effectiveness":[242],"protocol.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":6}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
