Identity management using blockchain for cognitive cellular networks

S. Raju, Sai Boddepalli, Suraj Gampa, Qiben Yan, J. Deogun
{"title":"Identity management using blockchain for cognitive cellular networks","authors":"S. Raju, Sai Boddepalli, Suraj Gampa, Qiben Yan, J. Deogun","doi":"10.1109/ICC.2017.7996830","DOIUrl":null,"url":null,"abstract":"Cloud-centric cognitive cellular networks utilize dynamic spectrum access and opportunistic network access technologies as a means to mitigate spectrum crunch and network demand. However, furnishing a carrier with personally identifiable information for user setup increases the risk of profiling in cognitive cellular networks, wherein users seek secondary access at various times with multiple carriers. Moreover, network access provisioning — assertion, authentication, authorization, and accounting — implemented in conventional cellular networks is inadequate in the cognitive space, as it is neither spontaneous nor scalable. In this paper, we propose a privacy-enhancing user identity management system using blockchain technology which places due importance on both anonymity and attribution, and supports end-to-end management from user assertion to usage billing. The setup enables network access using pseudonymous identities, hindering the reconstruction of a subscriber's identity. Our test results indicate that this approach diminishes access provisioning duration by up to 4x, decreases network signaling traffic by almost 40%, and enables near real-time user billing that may lead to approximately 3x reduction in payments settlement time.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"51","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Communications (ICC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.2017.7996830","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 51

Abstract

Cloud-centric cognitive cellular networks utilize dynamic spectrum access and opportunistic network access technologies as a means to mitigate spectrum crunch and network demand. However, furnishing a carrier with personally identifiable information for user setup increases the risk of profiling in cognitive cellular networks, wherein users seek secondary access at various times with multiple carriers. Moreover, network access provisioning — assertion, authentication, authorization, and accounting — implemented in conventional cellular networks is inadequate in the cognitive space, as it is neither spontaneous nor scalable. In this paper, we propose a privacy-enhancing user identity management system using blockchain technology which places due importance on both anonymity and attribution, and supports end-to-end management from user assertion to usage billing. The setup enables network access using pseudonymous identities, hindering the reconstruction of a subscriber's identity. Our test results indicate that this approach diminishes access provisioning duration by up to 4x, decreases network signaling traffic by almost 40%, and enables near real-time user billing that may lead to approximately 3x reduction in payments settlement time.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用区块链进行认知蜂窝网络的身份管理
以云为中心的认知蜂窝网络利用动态频谱接入和机会网络接入技术作为缓解频谱紧张和网络需求的手段。然而,为运营商提供用户设置的个人可识别信息增加了认知蜂窝网络中分析的风险,其中用户在不同时间通过多个运营商寻求二次访问。此外,在传统蜂窝网络中实现的网络访问供应——断言、身份验证、授权和计费——在认知空间中是不够的,因为它既不是自发的,也不是可扩展的。在本文中,我们提出了一种使用区块链技术的隐私增强用户身份管理系统,该系统重视匿名性和归属,并支持从用户断言到使用计费的端到端管理。该设置允许使用假名身份进行网络访问,从而阻碍了订阅者身份的重建。我们的测试结果表明,这种方法将访问供应持续时间缩短了4倍,将网络信令流量减少了近40%,并实现了近乎实时的用户计费,这可能会将支付结算时间缩短约3倍。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Dynamic control of NFV forwarding graphs with end-to-end deadline constraints New sensing technique for detecting application layer DDoS attacks targeting back-end database resources Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems On the two time scale characteristics of wireless high speed railway networks Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1