{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T12:30:27Z","timestamp":1753360227654,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No.2018YFA0701604","No.2018YFA0701604","No.2018YFA0701604","No.2018YFA0701604","No.2018YFA0701604"],"award-info":[{"award-number":["No.2018YFA0701604","No.2018YFA0701604","No.2018YFA0701604","No.2018YFA0701604","No.2018YFA0701604"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No.2021YJS012","No.2021YJS012","No.2021YJS012","No.2021YJS012","No.2021YJS012"],"award-info":[{"award-number":["No.2021YJS012","No.2021YJS012","No.2021YJS012","No.2021YJS012","No.2021YJS012"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>It is well known that the Sixth Generation (6G) communication system integrating multiple access networks promotes the internet of everything world-widely. However, due to the differentiated underlying network protocols, it is difficult to find a general authentication solution to support various authentication methods in different access networks. Blockchain is a new technology that supports network heterogeneity, which provides a potential solution for differentiated authentication. In this paper, we propose a blockchain-based differentiated authentication mechanism for 6G Heterogeneous Networks\u00a0(HetNets), which can efficiently authenticate user identities through scheduling different authentication methods. Particularly, we analyze the authentication architecture of 6G HetNets and put forward a blockchain-based differentiated authentication framework. Besides, to improve the scalability of user authentication, it is the first time to use various blockchain authentication contracts to represent different authentication methods. Meanwhile, a differentiated authentication management contract is proposed to uniformly manage different authentication contracts to realize differentiated identity authentication. Based on the evaluation of the prototype system, the proposed mechanism can dynamically provide differentiated authentication services\u00a0(e.g. EAP-MD5, 5G-AKA) with low additional time (milliseconds levels) cost.<\/jats:p>","DOI":"10.1007\/s12083-022-01437-x","type":"journal-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T11:03:39Z","timestamp":1673262219000},"page":"727-748","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Zhe","family":"Tu","sequence":"first","affiliation":[]},{"given":"Huachun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haoxiang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Quan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,9]]},"reference":[{"issue":"1","key":"1437_CR1","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/JIOT.2021.3103320","volume":"9","author":"DC Nguyen","year":"2022","unstructured":"Nguyen DC, Ding M, Pathirana PN, Seneviratne A, Li J, Niyato D, Dobre O, Poor HV (2022) 6G internet of things: a comprehensive survey. IEEE Internet Things J 9(1):359\u2013383","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1437_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCOM.001.1900411","volume":"58","author":"M Giordani","year":"2020","unstructured":"Giordani M, Polese M, Mezzavilla M, Rangan S, Zorzi M (2020) Toward 6G networks: Use cases and technologies. IEEE Commun Mag 58(3):55\u201361","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"1437_CR3","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/JIOT.2021.3126825","volume":"9","author":"X Zhu","year":"2020","unstructured":"Zhu X, Jiang C (2020) Integrated satellite-terrestrial networks toward 6G: Architectures, applications, and challenges. IEEE Internet Things J 9(1):437\u2013461","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1437_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MVT.2019.2921208","volume":"14","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Xiao Y, Ma Z, Xiao M, Ding Z, Lei X, Karagiannidis G, Fan P (2019) 6G wireless networks: Vision, requirements, architecture, and key technologies. IEEE Veh Technol Mag 14(3):28\u201341","journal-title":"IEEE Veh Technol Mag"},{"issue":"5","key":"1437_CR5","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M El-Hajj","year":"2019","unstructured":"El-Hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A survey of internet of things (IoT) authentication schemes. Sensors 19(5):1141","journal-title":"Sensors"},{"issue":"5","key":"1437_CR6","doi-asserted-by":"publisher","first-page":"5616","DOI":"10.1109\/TIA.2022.3184668","volume":"58","author":"W Wang","year":"2022","unstructured":"Wang W, Han Z, Alazab M, Gadekallu TR, Zhou X, Su C (2022) Ultra super fast authentication protocol for electric vehicle charging using extended chaotic maps. IEEE Trans Ind Appl 58(5):5616\u20135623","journal-title":"IEEE Trans Ind Appl"},{"issue":"5","key":"1437_CR7","doi-asserted-by":"publisher","first-page":"3321","DOI":"10.1109\/JIOT.2021.3098007","volume":"9","author":"X Yang","year":"2021","unstructured":"Yang X, Yang X, Yi X, Khalil I, Zhou X, He D, Huang X, Nepal S (2021) Blockchain-based secure and lightweight authentication for internet of things. IEEE Internet Things J 9(5):3321\u20133332","journal-title":"IEEE Internet Things J"},{"key":"1437_CR8","unstructured":"NakamotoS (2008) Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"5","key":"1437_CR9","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"HN Dai","year":"2019","unstructured":"Dai HN, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076\u20138094","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"1437_CR10","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/JIOT.2020.3008906","volume":"8","author":"BK Mohanta","year":"2020","unstructured":"Mohanta BK, Jena D, Ramasubbareddy S, Daneshmand M, Gandomi AH (2020) Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J 8(2):881\u2013888","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1437_CR11","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TII.2022.3188963","volume":"19","author":"SA Khowaja","year":"2022","unstructured":"Khowaja SA, Khuwaja P, Dev K, Lee IH, Khan WU, Wang W, Qureshi NMF, Magarini M (2022) A secure data sharing scheme in community segmented vehicular social networks for 6G. IEEE Trans Ind Inf 19(1):890\u2013899","journal-title":"IEEE Trans Ind Inf"},{"issue":"12","key":"1437_CR12","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.1109\/JSAC.2022.3213306","volume":"40","author":"W Wang","year":"2022","unstructured":"Wang W, Yang Y, Yin Z, Dev K, Zhou X, Li X, Qureshi NMF, Su C (2022) BSIF: Blockchain-based secure, interactive, and fair mobile crowdsensing. IEEE J Sel Areas Comm 40(12):3452\u20133469","journal-title":"IEEE J Sel Areas Comm"},{"key":"1437_CR13","doi-asserted-by":"crossref","unstructured":"Wang J, Ling X, Le Y, Huang Y, You X (2021) Blockchain-enabled wireless communications: a new paradigm towards 6G. Natl Sci Rev 8(9):nwab069","DOI":"10.1093\/nsr\/nwab069"},{"key":"1437_CR14","doi-asserted-by":"publisher","first-page":"100107","DOI":"10.1016\/j.iot.2019.100107","volume":"8","author":"BK Mohanta","year":"2019","unstructured":"Mohanta BK, Jena D, Panda SS, Sobhanayak S (2019) Blockchain technology: a survey on applications and security privacy challenges. Internet Things 8:100107","journal-title":"Internet Things"},{"issue":"10","key":"1437_CR15","doi-asserted-by":"crossref","first-page":"e3741","DOI":"10.1002\/ett.3741","volume":"30","author":"FH Pohrmen","year":"2019","unstructured":"Pohrmen FH, Das RK, Saha G (2019) Blockchain-based security aspects in heterogeneous internet-of-things networks: a survey. Trans Emerg Telecommun Technol 30(10):e3741","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"5","key":"1437_CR16","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Comm 38(5):942\u2013954","journal-title":"IEEE J Sel Areas Comm"},{"issue":"12","key":"1437_CR17","doi-asserted-by":"publisher","first-page":"11713","DOI":"10.1109\/JIOT.2020.2999510","volume":"7","author":"H Xiong","year":"2020","unstructured":"Xiong H, Wu Y, Jin C, Kumari S (2020) Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J 7(12):11713\u201311724","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"1437_CR18","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MWC.001.2000325","volume":"28","author":"Q Cui","year":"2021","unstructured":"Cui Q, Zhu Z, Ni W, Tao X, Zhang P (2021) Edge-intelligence-empowered, unified authentication and trust evaluation for heterogeneous beyond 5G systems. IEEE Wirel Commun 28(2):78\u201385","journal-title":"IEEE Wirel Commun"},{"key":"1437_CR19","doi-asserted-by":"publisher","first-page":"139001","DOI":"10.1109\/ACCESS.2019.2941913","volume":"7","author":"L Cao","year":"2019","unstructured":"Cao L, Liu Y, Cao S (2019) An authentication protocol in LTE-WLAN heterogeneous converged network based on certificateless signcryption scheme with identity privacy protection. IEEE Access 7:139001\u2013139012","journal-title":"IEEE Access"},{"key":"1437_CR20","doi-asserted-by":"crossref","unstructured":"Liu J, Ren A, Zhang L, Sun R, Du X, Guizani M (2019) A novel secure authentication scheme for heterogeneous internet of things. In: Proceedings of 2019 IEEE International Conference on Communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2019.8761951"},{"key":"1437_CR21","first-page":"1","volume":"1","author":"KA Alezabi","year":"2020","unstructured":"Alezabi KA, Hashim F, Hashim SJ, Ali BM (2020) Jamalipour A (2020) Efficient authentication and re-authentication protocols for 4G\/5G heterogeneous networks. EURASIP J Wirel Comm 1:1\u201334","journal-title":"EURASIP J Wirel Comm"},{"key":"1437_CR22","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2017.10.026","volume":"92","author":"S Athmani","year":"2019","unstructured":"Athmani S, Bilami A, Boubiche DE (2019) EDAK: an efficient dynamic authentication and key management mechanism for heterogeneous WSNS. Future Gener Comput Syst 92:789\u2013799","journal-title":"Future Gener Comput Syst"},{"issue":"6","key":"1437_CR23","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832\u20131843","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"1437_CR24","doi-asserted-by":"publisher","first-page":"7629","DOI":"10.1109\/TII.2020.3048398","volume":"17","author":"Y Tan","year":"2020","unstructured":"Tan Y, Liu J, Kato N (2020) Blockchain-based key management for heterogeneous flying Ad-Hoc network. IEEE Trans Industr Inform 17(11):7629\u20137638","journal-title":"IEEE Trans Industr Inform"},{"issue":"9","key":"1437_CR25","first-page":"3615","volume":"14","author":"S Zhang","year":"2020","unstructured":"Zhang S, Cao Y, Ning Z, Xue F, Cao D, Yang Y (2020) A heterogeneous IoT node authentication scheme based on hybrid blockchain and trust value. KSII Trans Internet Inf 14(9):3615\u20133638","journal-title":"KSII Trans Internet Inf"},{"issue":"3","key":"1437_CR26","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s10586-020-03058-6","volume":"23","author":"U Khalid","year":"2020","unstructured":"Khalid U, Asim M, Baker T, Hung PC, Tariq MA, Rafferty L (2020) A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Comput 23(3):2067\u20132087","journal-title":"Cluster Comput"},{"issue":"16","key":"1437_CR27","doi-asserted-by":"publisher","first-page":"12947","DOI":"10.1109\/JIOT.2021.3063806","volume":"8","author":"SS Panda","year":"2021","unstructured":"Panda SS, Jena D, Mohanta BK, Ramasubbareddy S, Daneshmand M, Gandomi AH (2021) Authentication and key management in distributed IoT using blockchain technology. IEEE Internet Things J 8(16):12947\u201312954","journal-title":"IEEE Internet Things J"},{"key":"1437_CR28","doi-asserted-by":"crossref","unstructured":"Lin W, Zhang X, Cui Q, Zhang Z (2021) Blockchain based unified authentication with zero-knowledge proof in heterogeneous MEC. In: Proceedings of 2021 IEEE International Conference on Communications Workshops (ICC Workshops), pp 1\u20136","DOI":"10.1109\/ICCWorkshops50388.2021.9473702"},{"issue":"3","key":"1437_CR29","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.dcan.2020.10.002","volume":"7","author":"N Shi","year":"2021","unstructured":"Shi N, Tan L, Li W, Qi X, Yu K (2021) A blockchain-empowered AAA scheme in the large-scale HetNet. Digit Commun Netw 7(3):308\u2013316","journal-title":"Digit Commun Netw"},{"key":"1437_CR30","first-page":"102538","volume":"55","author":"H Zhang","year":"2020","unstructured":"Zhang H, Chen X, Lan X, Jin H, Cao Q (2020) BTCAS: a blockchain-based thoroughly cross-domain authentication scheme. J Inf Secur Appl 55:102538","journal-title":"J Inf Secur Appl"},{"key":"1437_CR31","doi-asserted-by":"publisher","first-page":"6697155","DOI":"10.1155\/2021\/6697155","volume":"2021","author":"Y Luo","year":"2021","unstructured":"Luo Y, Li H, Ma R, Guo Z (2021) A composable multifactor identity authentication and authorization scheme for 5G services. Secur Commun Netw 2021:6697155","journal-title":"Secur Commun Netw"},{"key":"1437_CR32","doi-asserted-by":"crossref","unstructured":"Szabo N (1997) Formalizing and securing relationships on public networks. First Monday 2(9)","DOI":"10.5210\/fm.v2i9.548"},{"issue":"8","key":"1437_CR33","first-page":"3690","volume":"14","author":"Z Li","year":"2017","unstructured":"Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2017) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Ind Inf 14(8):3690\u20133700","journal-title":"IEEE Trans Ind Inf"},{"key":"1437_CR34","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, Caro AD, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukolic M, Cocco SW, Yellick J (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp 30:1\u201330:15","DOI":"10.1145\/3190508.3190538"},{"key":"1437_CR35","doi-asserted-by":"publisher","first-page":"216461","DOI":"10.1109\/ACCESS.2020.3041710","volume":"8","author":"M Hojjati","year":"2020","unstructured":"Hojjati M, Shafieinejad A, Yanikomeroglu H (2020) A blockchain-based authentication and key agreement (AKA) protocol for 5G networks. IEEE Access 8:216461\u2013216476","journal-title":"IEEE Access"},{"key":"1437_CR36","doi-asserted-by":"crossref","unstructured":"Tu Z, Zhou H, Li K, Song H, Wang W (2021) A blockchain-based user identity authentication method for 5G. In: Proceedings of International Symposium on Mobile Internet Security, pp 335\u2013351","DOI":"10.1007\/978-981-16-9576-6_23"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01437-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01437-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01437-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T07:31:18Z","timestamp":1701675078000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01437-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,9]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1437"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01437-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2023,1,9]]},"assertion":[{"value":"26 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}