{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T14:01:33Z","timestamp":1776175293972,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04139-y","type":"journal-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T13:03:44Z","timestamp":1635339824000},"page":"6788-6816","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["AUGChain: blockchain-based mobile user authentication scheme in global mobility network"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0981-4935","authenticated-orcid":false,"given":"Sudip Kumar","family":"Palit","sequence":"first","affiliation":[]},{"given":"Mohuya","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Subhalaxmi","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,27]]},"reference":[{"issue":"3","key":"4139_CR1","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/MNET.001.1900336","volume":"34","author":"A Refaey","year":"2020","unstructured":"Refaey A, Hammad K, Magierowski S, Hossain E (2020) A blockchain policy and charging control framework for roaming in cellular networks. IEEE Netw 34(3):170\u2013177","journal-title":"IEEE Netw"},{"key":"4139_CR2","unstructured":"Nayak S, Singh A, Vora J, Marchi L, Thomas M, Alexander M, Prasad S, Mangla U (2020) Blockchain for telecom roaming, fraud user identification, and overage management. https:\/\/developer.ibm.com\/technologies\/blockchain\/patterns\/blockchain-for-telecom-roaming-fraud-and-overage-management\/ Accessed 28 Apr, 2020"},{"issue":"50","key":"4139_CR3","first-page":"231","volume":"232","author":"J Zhu","year":"2004","unstructured":"Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 232(50):231\u2013235","journal-title":"IEEE Trans Consum Electron"},{"issue":"10","key":"4139_CR4","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C Wu","year":"2008","unstructured":"Wu C, Lee W, Tsaur W (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722\u2013723","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"4139_CR5","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/LCOMM.2009.081821","volume":"13","author":"P Zeng","year":"2009","unstructured":"Zeng P, Cao Z, Choo K, Wang S (2009) On the anonymity of some authentication schemes for wireless communication. IEEE Commun Lett 13(3):170\u2013171","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"4139_CR6","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.comnet.2010.08.008","volume":"55","author":"T Zhou","year":"2011","unstructured":"Zhou T, Xu J (2011) Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput Netw 55(1):205\u2013213","journal-title":"Comput Netw"},{"issue":"1","key":"4139_CR7","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.mcm.2011.04.036","volume":"55","author":"H Mun","year":"2012","unstructured":"Mun H, Han K, Lee Y, Yeun C, Choi H (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214\u2013222","journal-title":"Math Comput Model"},{"key":"4139_CR8","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1002\/wcm.2252","volume":"14","author":"W Hsieh","year":"2012","unstructured":"Hsieh W, Leu J (2012) Anonymous authentication protocol based on elliptic curve diffiehellman for wireless access networks. Wirel Commun Mob Comput 14:995\u20131006","journal-title":"Wirel Commun Mob Comput"},{"issue":"3","key":"4139_CR9","first-page":"45","volume":"6","author":"J Kim","year":"2012","unstructured":"Kim J, Kwak J (2012) Improved secure anonymous authentication scheme for roaming service in global mobile network. Int J Secur Appl 6(3):45\u201354","journal-title":"Int J Secur Appl"},{"issue":"4","key":"4139_CR10","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wirel Pers Commun 68(4):1477\u20131491","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"4139_CR11","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He D, Zhang Y, Chen (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229\u2013243","journal-title":"Wirel Pers Commun"},{"issue":"9","key":"4139_CR12","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-013-1243-4","volume":"73","author":"F Wen","year":"2013","unstructured":"Wen F, Susilo W, Yang G (2013) A secure and effective user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(9):993\u20131004","journal-title":"Wirel Pers Commun"},{"key":"4139_CR13","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11277-014-1750-y","volume":"78","author":"D Zhao","year":"2014","unstructured":"Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78:247\u2013269","journal-title":"Wirel Pers Commun"},{"key":"4139_CR14","first-page":"18","volume":"19","author":"W Kuo","year":"2014","unstructured":"Kuo W, Wei H, Cheng J (2014) An efficient and secure anonymous mobility network authentication scheme. J Inf Secur Appl 19:18\u201324","journal-title":"J Inf Secur Appl"},{"key":"4139_CR15","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1007\/s11277-015-2344-z","volume":"82","author":"P Gope","year":"2015","unstructured":"Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82:2231\u20132245","journal-title":"Wirel Pers Commun"},{"key":"4139_CR16","doi-asserted-by":"publisher","first-page":"20552078","DOI":"10.1007\/s11277-015-2524-x","volume":"84","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84:20552078","journal-title":"Wirel Pers Commun"},{"key":"4139_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.12.003","volume":"62","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1\u20138","journal-title":"J Netw Comput Appl"},{"key":"4139_CR18","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/s11277-016-3682-1","volume":"94","author":"C Lee","year":"2017","unstructured":"Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 94:1281\u20131296","journal-title":"Wirel Pers Commun"},{"key":"4139_CR19","doi-asserted-by":"crossref","unstructured":"Madhusudhan R, Suvidha KS (2017) An efficient and secure user authentication scheme with anonymity in global mobility networks. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp 19\u201324","DOI":"10.1109\/WAINA.2017.133"},{"key":"4139_CR20","doi-asserted-by":"publisher","first-page":"25110","DOI":"10.1109\/ACCESS.2017.2773535","volume":"5","author":"K Park","year":"2017","unstructured":"Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110\u201325125","journal-title":"IEEE Access"},{"key":"4139_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.compeleceng.2018.03.030","volume":"68","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107\u2013118","journal-title":"Comput Electr Eng"},{"issue":"2","key":"4139_CR22","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/JSYST.2018.2883349","volume":"13","author":"Y Lu","year":"2019","unstructured":"Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454\u20131465","journal-title":"IEEE Syst J"},{"key":"4139_CR23","first-page":"96","volume":"38","author":"R Madhusudhan","year":"2018","unstructured":"Madhusudhan R, Shashidhara (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96\u2013110","journal-title":"J Inf Secur Appl"},{"issue":"10","key":"4139_CR24","doi-asserted-by":"publisher","first-page":"3565","DOI":"10.3390\/app10103565","volume":"10","author":"S Yu","year":"2020","unstructured":"Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565","journal-title":"Appl Sci"},{"key":"4139_CR25","doi-asserted-by":"crossref","unstructured":"Sohail MM, Hassan M, Mansoor K, Ghani A, Jawad K (2020) An improved authentication protocol for global mobility network (GLOMONET). In: 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp 401\u2013406","DOI":"10.1109\/IBCAST47879.2020.9044490"},{"key":"4139_CR26","first-page":"102588","volume":"54","author":"M Nikooghadam","year":"2020","unstructured":"Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588","journal-title":"J Inf Secur Appl"},{"key":"4139_CR27","doi-asserted-by":"publisher","first-page":"88256","DOI":"10.1109\/ACCESS.2021.3089102","volume":"9","author":"AM Rahmani","year":"2021","unstructured":"Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M (2021) AMAPG: advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256\u201388271","journal-title":"IEEE Access"},{"issue":"2","key":"4139_CR28","doi-asserted-by":"publisher","first-page":"e0247441","DOI":"10.1371\/journal.pone.0247441","volume":"16","author":"D Kang","year":"2021","unstructured":"Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441","journal-title":"PLoS ONE"},{"key":"4139_CR29","doi-asserted-by":"publisher","first-page":"216461","DOI":"10.1109\/ACCESS.2020.3041710","volume":"8","author":"M Hojjati","year":"2020","unstructured":"Hojjati M, Shafieinejad A, Yanikomeroglu H (2020) A Blockchain-based authentication and key agreement (AKA) protocol for 5G networks. IEEE Access 8:216461\u2013216476","journal-title":"IEEE Access"},{"key":"4139_CR30","doi-asserted-by":"crossref","unstructured":"Haddad Z, Fouda MM, Mahmoud M, Abdallah M (2020) Blockchain-based authentication for 5G networks. In: IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp 189\u2013194","DOI":"10.1109\/ICIoT48696.2020.9089507"},{"key":"4139_CR31","unstructured":"Hyperledger fabric retrieved from. http:\/\/www.hyperledger.org\/use\/fabric\/. Accessed 20 May 2020"},{"key":"4139_CR32","unstructured":"Hyperledger composer retrieved from. http:\/\/hyperledger.github.io\/composer\/latest\/. Accessed 20 June 2020"},{"key":"4139_CR33","unstructured":"Hyperledger playground retrieved from. https:\/\/hyperledger.github.io\/composer\/latest\/playground\/playground-index. Accessed 20 June 2020"},{"key":"4139_CR34","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426:233\u2013271","journal-title":"Proc R Soc Lond A Math Phys Sci"},{"key":"4139_CR35","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology\u2014CRYPTO-99, vol 68. Springer, Berlin, Heidelberg, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"4139_CR36","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T Messerges","year":"2002","unstructured":"Messerges T, Dabbish E, Sloan R (2002) Examining smartcard security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"key":"4139_CR37","doi-asserted-by":"publisher","first-page":"20673","DOI":"10.1109\/ACCESS.2018.2827027","volume":"6","author":"S Banerjee","year":"2018","unstructured":"Banerjee S, Odelu V, Das AK, Chattopadhyay S, Kumar N, Park Y, Tanwar S (2018) Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access 6:20673\u201320693","journal-title":"IEEE Access"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04139-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04139-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04139-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T20:32:23Z","timestamp":1699734743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04139-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,27]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4139"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04139-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,27]]},"assertion":[{"value":"9 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}