{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:18:42Z","timestamp":1771341522573,"version":"3.50.1"},"reference-count":35,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"vor","delay-in-days":2,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Lightweight and secure authentication is a fundamental requirement for mobile roaming in edge\u2010assisted networks, particularly in the presence of resource constraints and the emerging threat of quantum\u2010capable adversaries. This paper proposes a blockchain\u2010assisted authentication protocol that employs post\u2010quantum cryptographic primitives to generate and validate device\u2010bound tokens. During registration, a Home Agent (HA) issues blockchain\u2010anchored tokens containing signed security metadata and a freshness counter to prevent replay attacks. In roaming scenarios, the Mobile User (MU) selectively discloses token metadata to the Foreign Agent (FA), which verifies its authenticity with the HA to enable efficient and trustworthy authentication. A hybrid key establishment using post\u2010quantum key encapsulation ensures forward secrecy and quantum\u2010resistant confidentiality. Formal verification through BAN logic reasoning and automated analysis using the Scyther tool confirm that the protocol withstands impersonation, replay, and man\u2010in\u2010the\u2010middle attacks. Experimental evaluation on mobile devices demonstrates low computational and communication overhead, showing that the protocol is practical and well\u2010suited for real\u2010world deployment in edge\u2010assisted mobility environments.<\/jats:p>","DOI":"10.1002\/spy2.70131","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T09:20:57Z","timestamp":1762161657000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Lightweight and Secure Authentication Protocol With Blockchain\u2010Bound Device Tokens for Mobile Roaming in Edge Networks"],"prefix":"10.1002","volume":"8","author":[{"given":"Suprith","family":"Kumar K S","sequence":"first","affiliation":[{"name":"Dept. of Electronics and Communication Engineering BMSCE  Bengaluru India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9615-3153","authenticated-orcid":false,"given":"Akhila","family":"S","sequence":"additional","affiliation":[{"name":"Dept. of Electronics and Communication Engineering BMSCE  Bengaluru India"}]},{"given":"Poornima","family":"R M","sequence":"additional","affiliation":[{"name":"Dept. of Information Science and Engineering Global Academy of Technology  Bengaluru India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5546-6049","authenticated-orcid":false,"given":"Indushree","family":"M","sequence":"additional","affiliation":[{"name":"Dept. of CSE with Cyber Security Dayananda Sagar University  Bengaluru India"}]}],"member":"311","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103334"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.10.016"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100902"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3188711"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101626"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3602311"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.01.011"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2024.05.011"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670338"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3659997.3660033"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11596-0"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040867"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3323275"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.12.026"},{"key":"e_1_2_10_16_1","first-page":"C","article-title":"LAFED: A Lightweight Authentication Mechanism for Blockchain\u2010Enabled Federated Learning System","volume":"145","author":"Xie X.","year":"2023","journal-title":"Future Generation Computer Systems"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277\u2010023\u201010731\u20107"},{"issue":"4","key":"e_1_2_10_18_1","first-page":"98","article-title":"Blockchain\u2010Enhanced Security for 5G Edge Computing in IoT","volume":"13","author":"Ma R.","year":"2024","journal-title":"Mathematics"},{"issue":"3","key":"e_1_2_10_19_1","first-page":"2680","article-title":"Post\u2010Quantum Lattice\u2010Based Secure Reconciliation Enabled Key Agreement Protocol for IoT","volume":"10","author":"Verma G. K.","year":"2024","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_2_10_20_1","first-page":"242","volume-title":"Proceedings of the 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom)","author":"Yadav A. K.","year":"2023"},{"issue":"8","key":"e_1_2_10_21_1","first-page":"338","article-title":"A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps","volume":"17","author":"Ma R.","year":"2023","journal-title":"Future Internet"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi16050166"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01778-9"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108703"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01020-2"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3002096"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3595649"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8836214"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.449"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7707543"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04246-2"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.003"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2524-x"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00929-y"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.23919\/transcom.2024EBP3004"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3286016"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:43:20Z","timestamp":1763451800000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70131"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70131","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"value":"2475-6725","type":"print"},{"value":"2475-6725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"2025-08-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70131"}}