IEEE Access (Jan 2023)

Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network

  • Adnan Shahid Khan,
  • Mohd Izzat Bin Yahya,
  • Kartinah Bt Zen,
  • Johari Bin Abdullah,
  • Rozeha Binti A. Rashid,
  • Yasir Javed,
  • Nayeem Ahmad Khan,
  • Ahmed M. Mostafa

DOI
https://doi.org/10.1109/ACCESS.2023.3249969
Journal volume & issue
Vol. 11
pp. 20524 – 20541

Abstract

Read online

Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. Cell-Free gained researchers’ interest as it offers ubiquitous communication with large bandwidth, high throughput, high data transmission, and greater signal gain. Cell-Free eliminates the idea of cell boundary in cellular communication that reduces frequent handover and inter-cell interference issues. However, the effectiveness of the current authentication protocol could become a serious issue due to the dynamic nature of Cell-Free in densely distributed, high number of users, high mobility, and frequent data exchange. Secondly, secure communication may be achieved in such a dynamic environment at the expense of high authentication overhead, high communication and computational costs. To address the above security challenges, we proposed a lightweight multifactor mutual authentication protocol for Cell-Free communication using ECC-based Deffie Hellman (ECDH). This scheme utilizes timestamping, one-way hash function, Blind-Fold Challenge scheme with public key infrastructure. The proposed cryptosystem integrates with blockchain technology using proof of staked (POS) as a consensus mechanism to ensure integrity, non-repudiation and traceability. The proposed scheme can enforce the mitigation of several major security attacks on communication links such as spoofing attacks, eavesdropping, user location privacy issues, replay attacks, denial of service attacks, and man-in-the-middle (MITM) attacks, which is one of the significant features of the scheme. Furthermore, this scheme contributes to reducing authentication, communication, and computational overheads with an average of 32.8%, 52.4% and 53.2% better performance respectively as compared baseline authentication protocols.

Keywords