当前位置: X-MOL 学术Wireless Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A strong smartphone authentication model to control cellular network access using blockchain
Wireless Networks ( IF 2.1 ) Pub Date : 2021-03-12 , DOI: 10.1007/s11276-021-02542-0
Shikah J. Alsunaidi , Abdullah M. Almuhaideb

In an era that requests facilitating access to most services by providing the online platforms, the need to own a small electronic device is increasing. The smartphone is the ideal choice for most people due to its multifunctionality. On the other hand, the rate of physical crimes on these devices raised, especially theft and counterfeiting. As a solution to mitigate these crimes, stolen or counterfeit devices are prevented from connecting to the cellular network, but is this solution effective in mitigating the problem? To answer this question, this paper conducts a comprehensive survey on the current solutions tackled the smartphone theft or counterfeit issues, and it provides a taxonomy classify the current solutions into three categories: manufacturers solutions, cellular service provider solutions, and third-party solutions. The proposed smartphone authentication model for cellular network authentication utilizes the permissioned Blockchain network and consists of three protocols, which are smartphone registration protocol, ownership transfer protocol, and cellular network authentication protocol. In order to overcome the two serious physical crimes (theft and counterfeiting), the paper identifies five main requirements that must be met in any cellular network authentication approach, namely ability to detect counterfeit IMEI, ability to identify the device owner, ability to block the service on the stolen/lost devices, less processing time, and acceptable performance. The comparisons with related solutions showed that the proposed work meets all the requirements to mitigate smartphone theft and counterfeiting crimes.



中文翻译:

强大的智能手机身份验证模型,可使用区块链控制蜂窝网络访问

在要求通过提供在线平台来方便访问大多数服务的时代,拥有小型电子设备的需求正在增加。智能手机因其多功能性而成为大多数人的理想选择。另一方面,这些设备上的实物犯罪率上升,尤其是盗窃和伪造。作为减轻这些犯罪的一种解决方案,可以防止被盗或伪造的设备连接到蜂窝网络,但是这种解决方案在减轻问题方面是否有效?为了回答这个问题,本文对解决智能手机盗窃或假冒问题的当前解决方案进行了全面调查,并提供了将当前解决方案分为三类的分类法:制造商解决方案,蜂窝服务提供商解决方案和第三方解决方案。所提出的用于蜂窝网络认证的智能手机认证模型利用许可的区块链网络,并由三个协议组成,分别是智能手机注册协议,所有权转移协议和蜂窝网络认证协议。为了克服两种严重的物理犯罪(盗窃和伪造),本文确定了在任何蜂窝网络认证方法中必须满足的五个主要要求,即检测伪造IMEI的能力,识别设备所有者的能力,阻止伪造IMEI的能力。设备被盗/丢失的服务,更少的处理时间和可接受的性能。与相关解决方案的比较表明,拟议的工作符合缓解智能手机盗窃和假冒犯罪的所有要求。

更新日期:2021-03-12
down
wechat
bug