{"id":"https://openalex.org/W4327767826","doi":"https://doi.org/10.1109/ccnc51644.2023.10059918","title":"A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain","display_name":"A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain","publication_year":2023,"publication_date":"2023-01-08","ids":{"openalex":"https://openalex.org/W4327767826","doi":"https://doi.org/10.1109/ccnc51644.2023.10059918"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51644.2023.10059918","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51644.2023.10059918","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078852484","display_name":"Awaneesh Kumar Yadav","orcid":"https://orcid.org/0000-0002-2924-0361"},"institutions":[{"id":"https://openalex.org/I154851008","display_name":"Indian Institute of Technology Roorkee","ror":"https://ror.org/00582g326","country_code":"IN","type":"education","lineage":["https://openalex.org/I154851008"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Awaneesh Kumar Yadav","raw_affiliation_strings":["Indian Institute of Technology Roorkee,Dept. of Computer Science and Engineering,Uttarakhand,India","Dept. of Computer Science and Engineering, Indian Institute of Technology Roorkee, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Roorkee,Dept. of Computer Science and Engineering,Uttarakhand,India","institution_ids":["https://openalex.org/I154851008"]},{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Indian Institute of Technology Roorkee, Uttarakhand, India","institution_ids":["https://openalex.org/I154851008"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011861898","display_name":"An Braeken","orcid":"https://orcid.org/0000-0002-9965-915X"},"institutions":[{"id":"https://openalex.org/I13469542","display_name":"Vrije Universiteit Brussel","ror":"https://ror.org/006e5kg04","country_code":"BE","type":"education","lineage":["https://openalex.org/I13469542"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"An Braeken","raw_affiliation_strings":["Vrije Universiteit Brussel,Department of engineering, technology (INDI),Belgium","Department of engineering, technology (INDI), Vrije Universiteit Brussel, Belgium"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Brussel,Department of engineering, technology (INDI),Belgium","institution_ids":["https://openalex.org/I13469542"]},{"raw_affiliation_string":"Department of engineering, technology (INDI), Vrije Universiteit Brussel, Belgium","institution_ids":["https://openalex.org/I13469542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101735351","display_name":"Manoj Misra","orcid":"https://orcid.org/0000-0002-4334-9494"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]},{"id":"https://openalex.org/I154851008","display_name":"Indian Institute of Technology Roorkee","ror":"https://ror.org/00582g326","country_code":"IN","type":"education","lineage":["https://openalex.org/I154851008"]},{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["FI","IE","IN"],"is_corresponding":false,"raw_author_name":"Manoj Misra","raw_affiliation_strings":["Indian Institute of Technology Roorkee,Dept. of Computer Science and Engineering,Uttarakhand,India","CWC, University of Oulu, Finland","School of Computer Science, University College Dublin, Ireland","Dept. of Computer Science and Engineering, Indian Institute of Technology Roorkee, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Roorkee,Dept. of Computer Science and Engineering,Uttarakhand,India","institution_ids":["https://openalex.org/I154851008"]},{"raw_affiliation_string":"CWC, University of Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Indian Institute of Technology Roorkee, Uttarakhand, India","institution_ids":["https://openalex.org/I154851008"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114033181","display_name":"Madhusanka Liyange","orcid":null},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]},{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["FI","IE"],"is_corresponding":false,"raw_author_name":"Madhusanka Liyange","raw_affiliation_strings":["School of Computer Science, University College Dublin,Ireland","CWC, University of Oulu, Finland","School of Computer Science, University College Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"CWC, University of Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078852484"],"corresponding_institution_ids":["https://openalex.org/I154851008"],"apc_list":null,"apc_paid":null,"fwci":1.3973,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8158155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1110","last_page":"1115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7912106513977051},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.6504932641983032},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6470909118652344},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6320515275001526},{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.5546544194221497},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4685949385166168},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4491991400718689},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44159069657325745},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.4316234886646271},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2819756269454956},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18380671739578247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7912106513977051},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.6504932641983032},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6470909118652344},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6320515275001526},{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.5546544194221497},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4685949385166168},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4491991400718689},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44159069657325745},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.4316234886646271},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2819756269454956},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18380671739578247},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ccnc51644.2023.10059918","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51644.2023.10059918","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:166081","is_oa":false,"landing_page_url":"https://biblio.vub.ac.be/vubir/a-provably-secure-and-efficient-5gaka-authentication-protocol-using-blockchain(e78e5c69-9ed8-48ab-8895-01ba8c46d878).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:vubissmart:VUBISSMART:2000:229326","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402573","display_name":"VUBIR (Vrije Universiteit Brussel)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I13469542","host_organization_name":"Vrije Universiteit Brussel","host_organization_lineage":["https://openalex.org/I13469542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1526070463","https://openalex.org/W1541979851","https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2907767077","https://openalex.org/W2941876624","https://openalex.org/W2944001547","https://openalex.org/W3043271373","https://openalex.org/W3107465731","https://openalex.org/W3115741206","https://openalex.org/W3152283462","https://openalex.org/W3192056410","https://openalex.org/W3193882466","https://openalex.org/W4200334887","https://openalex.org/W4206784086","https://openalex.org/W4214845450","https://openalex.org/W4283707653","https://openalex.org/W4288784348","https://openalex.org/W4302010741","https://openalex.org/W6797027906"],"related_works":["https://openalex.org/W2099275250","https://openalex.org/W2149879515","https://openalex.org/W2244007585","https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2054202867"],"abstract_inverted_index":{"The":[0,109],"next":[1],"generation":[2],"of":[3,11,15,72,87,112,129,149,158],"mobile":[4,42,82],"communication":[5,152],"systems":[6],"must":[7],"be":[8],"secured":[9],"because":[10],"the":[12,22,25,41,77,80,85,91,107,113,119,127,130,140,156,159,164],"ongoing":[13],"entrance":[14],"numerous":[16,52],"security":[17,110],"attacks.":[18],"Thus,":[19],"to":[20,36,93,144,174],"secure":[21],"underlying":[23],"network,":[24],"3GPP":[26],"has":[27,51],"designed":[28],"an":[29],"authentication":[30,104],"and":[31,38,70,90,123,151,170],"key":[32],"agreement":[33],"protocol,":[34],"5G-AKA,":[35],"safely":[37],"stably":[39],"access":[40],"services.":[43,83],"However,":[44],"some":[45],"recent":[46],"observations":[47],"indicate":[48],"that":[49,137,163],"5G-AKA":[50,103],"shortcomings":[53,86],"such":[54],"as":[55],"perfect":[56],"forward":[57],"secrecy":[58],"violation,":[59],"malicious":[60],"Serving":[61],"Network":[62],"(SN),":[63],"de-synchronization":[64],"attack,":[65],"privacy":[66],"theft,":[67],"stolen":[68],"device,":[69],"denial":[71],"Service":[73],"(DoS)":[74],"attacks":[75],"when":[76],"user":[78],"uses":[79],"roaming":[81],"Considering":[84],"existing":[88],"protocols":[89],"requirement":[92],"offer":[94],"increased":[95],"security,":[96],"we":[97],"propose":[98],"a":[99],"provable":[100],"secure,":[101],"efficient":[102],"protocol":[105,115,132,166],"using":[106,118],"blockchain.":[108],"features":[111],"proposed":[114,131,165],"are":[116],"examined":[117],"Real-Or-Random":[120],"(ROR)":[121],"logic":[122],"Scyther":[124],"tool.":[125],"Furthermore,":[126],"performance":[128],"is":[133,139],"evaluated,":[134],"which":[135],"shows":[136],"it":[138],"least":[141],"costly":[142],"compared":[143,173],"its":[145,175],"counterparts":[146],"in":[147],"terms":[148],"computational":[150],"costs.":[153],"In":[154],"addition,":[155],"comparison":[157],"Ethereum":[160],"blockchain":[161],"depicts":[162],"takes":[167],"less":[168],"transaction":[169],"execution":[171],"costs":[172],"counterparts.":[176]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
