{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:32:23Z","timestamp":1772645543811,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12652-024-04880-1","type":"journal-article","created":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T09:48:51Z","timestamp":1738576131000},"page":"51-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure and effective authentication for 5G networks (SEA-5G) using blockchain"],"prefix":"10.1007","volume":"16","author":[{"given":"R.","family":"Bala","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Manoharan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,2,3]]},"reference":[{"issue":"3","key":"4880_CR1","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","volume":"18","author":"M Agiwal","year":"2016","unstructured":"Agiwal M, Roy A, Saxena N (2016) Next generation 5G wireless networks: a comprehensive survey. IEEE Commun Surv Tutorials 18(3):1617\u20131655. https:\/\/doi.org\/10.1109\/COMST.2016.2532458","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"4880_CR2","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2019","unstructured":"Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun Surv Tutorials 22(1):196\u2013248. https:\/\/doi.org\/10.1109\/COMST.2019.2933899","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"4880_CR3","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1109\/COMST.2016.2571730","volume":"18","author":"M Kamel","year":"2016","unstructured":"Kamel M, Hamouda W, Youssef A (2016) Ultra-dense networks: a survey. IEEE Commun Surv Tutorials 18(4):2522\u20132545. https:\/\/doi.org\/10.1109\/COMST.2016.2571730","journal-title":"IEEE Commun Surv Tutorials"},{"key":"4880_CR4","doi-asserted-by":"publisher","unstructured":"Mun H, Han K, Kim K (2009) April. 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. In 2009 Wireless Telecommunications Symposium (pp. 1\u20138). IEEE. https:\/\/doi.org\/10.1109\/WTS.2009.5068983","DOI":"10.1109\/WTS.2009.5068983"},{"key":"4880_CR5","doi-asserted-by":"publisher","first-page":"55372","DOI":"10.1109\/ACCESS.2018.2871642","volume":"6","author":"Z Chen","year":"2018","unstructured":"Chen Z, Chen S, Xu H, Hu B (2018) A security authentication scheme of 5G ultra-dense network based on block chain. IEEE Access 6:55372\u201355379. https:\/\/doi.org\/10.1109\/ACCESS.2018.2871642","journal-title":"IEEE Access"},{"key":"4880_CR6","unstructured":"Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Manubot. https:\/\/git.dhimmel.com\/bitcoin-whitepaper\/"},{"issue":"3","key":"4880_CR7","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TNSE.2022.3233448","volume":"10","author":"T Ye","year":"2023","unstructured":"Ye T, Luo M, Yang Y, Choo K-KR, Debiao He (2023) A survey on redactable blockchain: challenges and opportunities. IEEE Trans Netw Sci Eng 10(3):1669\u20131683","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"4880_CR8","doi-asserted-by":"crossref","unstructured":"Dash SP (2023) An introduction to blockchain technology: Recent trends. Recent Advances in Blockchain Technology: Real-World Applications: 1\u201324","DOI":"10.1007\/978-3-031-22835-3_1"},{"key":"4880_CR9","doi-asserted-by":"publisher","first-page":"10127","DOI":"10.1109\/ACCESS.2018.2890507","volume":"7","author":"K Salah","year":"2019","unstructured":"Salah K, Rehman MHU, Nizamuddin N, Al-Fuqaha A (2019) Blockchain for AI: review and open research challenges. IEEE Access 7:10127\u201310149. https:\/\/doi.org\/10.1109\/ACCESS.2018.2890507","journal-title":"IEEE Access"},{"key":"4880_CR10","doi-asserted-by":"crossref","unstructured":"Litke A, Anagnostopoulos D, Varvarigou T (2019) Blockchains for supply chain management: architectural elements and challenges towards a global scale deployment. Logistics, 3(1), p.5. https:\/\/www.mdpi.com\/2305-6290\/3\/1\/5","DOI":"10.3390\/logistics3010005"},{"issue":"10","key":"4880_CR11","doi-asserted-by":"publisher","first-page":"3652","DOI":"10.3390\/su10103652","volume":"10","author":"M Kouhizadeh","year":"2018","unstructured":"Kouhizadeh M, Sarkis J (2018) Blockchain practices, potentials, and perspectives in greening supply chains. Sustainability 10(10):3652. https:\/\/www.mdpi.com\/2071-1050\/10\/10\/3652","journal-title":"Sustainability"},{"key":"4880_CR12","doi-asserted-by":"publisher","unstructured":"Al-Jaroodi J, Mohamed N (2019) Blockchain in industries: A survey. IEEE Access, 7, pp.36500\u201336515. https:\/\/doi.org\/10.1109\/ACCESS.2019.2903554","DOI":"10.1109\/ACCESS.2019.2903554"},{"key":"4880_CR13","doi-asserted-by":"publisher","first-page":"117134","DOI":"10.1109\/ACCESS.2019.2936094","volume":"7","author":"AA Monrat","year":"2019","unstructured":"Monrat AA, Schel\u00e9n O, Andersson K (2019) A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7:117134\u2013117151. https:\/\/doi.org\/10.1109\/ACCESS.2019.2936094","journal-title":"IEEE Access"},{"key":"4880_CR14","unstructured":"Kroll JA, Davey IC, Felten EW (2013) June. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of WEIS (Vol. 2013, p. 11)"},{"key":"4880_CR15","doi-asserted-by":"publisher","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) June. An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557\u2013564). IEEE. https:\/\/doi.org\/10.1109\/BigDataCongress.2017.85","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"1","key":"4880_CR16","first-page":"100","volume":"12","author":"V Verma","year":"2023","unstructured":"Verma V (2023) An overview of Blockchain Technology: Past & Future. Eduzone: Int Peer Reviewed\/Refereed Multidisciplinary J 12(1):100\u2013104","journal-title":"Eduzone: Int Peer Reviewed\/Refereed Multidisciplinary J"},{"key":"4880_CR17","doi-asserted-by":"publisher","unstructured":"Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) May. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) (pp. 468\u2013477). IEEE. https:\/\/doi.org\/10.1109\/CCGRID.2017.8","DOI":"10.1109\/CCGRID.2017.8"},{"issue":"4","key":"4880_CR18","first-page":"1845","volume":"15","author":"Ravi Kumar","year":"2023","unstructured":"Ravi Kumar, Shipra, Goyal M (2023) TISCMB: design of a highly efficient blockchain consensus model with trust integrated self-correcting miner selection. Int J Inform Technol 15(4):1845\u20131858","journal-title":"Int J Inform Technol"},{"issue":"3","key":"4880_CR19","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1093\/rfs\/hhaa075","volume":"34","author":"F Saleh","year":"2021","unstructured":"Saleh F (2021) Blockchain without waste: Proof-of-stake. Rev Financial Stud 34(3):1156\u20131190. https:\/\/doi.org\/10.1093\/rfs\/hhaa075","journal-title":"Rev Financial Stud"},{"issue":"2","key":"4880_CR20","first-page":"1171","volume":"16","author":"D Singhal","year":"2024","unstructured":"Singhal D, Ahuja L, Seth A (2024) POSMETER: proof-of-stake blockchain for enhanced smart meter data security. Int J Inform Technol 16(2):1171\u20131184","journal-title":"Int J Inform Technol"},{"key":"4880_CR21","doi-asserted-by":"publisher","unstructured":"Wang X, WeiLi J, Chai J (2018) December. The research on the incentive method of consortium blockchain based on practical byzantine fault tolerance. In 2018 11th International Symposium on Computational Intelligence and Design (ISCID), 2, pp. 154\u2013156. IEEE. https:\/\/doi.org\/10.1109\/ISCID.2018.10136","DOI":"10.1109\/ISCID.2018.10136"},{"key":"4880_CR22","doi-asserted-by":"publisher","unstructured":"Zheng K, Liu Y, Dai C, Duan Y, Huang X (2018) October. Model checking PBFT consensus mechanism in healthcare blockchain network. In 2018 9th International Conference on Information Technology in Medicine and Education (ITME), pp. 877\u2013881. IEEE. https:\/\/doi.org\/10.1109\/ITME.2018.00196","DOI":"10.1109\/ITME.2018.00196"},{"key":"4880_CR23","unstructured":"Cachin C (2016) July. Architecture of the hyperledger blockchain fabric. In Workshop on distributed cryptocurrencies and consensus ledgers, 310 (No). https:\/\/www.zurich.ibm.com\/dccl\/papers\/cachin_dccl.pdf"},{"key":"4880_CR24","doi-asserted-by":"publisher","unstructured":"Haddad Z, Fouda MM, Mahmoud M, Abdallah M (2020) February. Blockchain-based Authentication for 5G Networks. In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 189\u2013194. IEEE. https:\/\/doi.org\/10.1109\/ICIoT48696.2020.9089507","DOI":"10.1109\/ICIoT48696.2020.9089507"},{"key":"4880_CR25","doi-asserted-by":"crossref","unstructured":"Jia X, Hu N, Yin S, Zhao Y, Zhang C, Cheng X (2020) A2 chain: a blockchain-based decentralized authentication Scheme for 5G-Enabled IoT. Mob Inform Syst 2020. https:\/\/www.hindawi.com\/journals\/misy\/2020\/8889192\/","DOI":"10.1155\/2020\/8889192"},{"key":"4880_CR26","doi-asserted-by":"crossref","unstructured":"Rahmadika S, Firdaus M, Jang S, Kyung-Hyune Rhee (2021) Blockchain-enabled 5\u00a0g edge networks and beyond: an intelligent cross-silo federated learning approach. Security and Communication Networks 2021","DOI":"10.1155\/2021\/5550153"},{"key":"4880_CR27","doi-asserted-by":"crossref","unstructured":"Babu E, Suresh A, Barthwal, and Rajesh Kaluri (2023) Sec-edge: trusted blockchain system for enabling the identification and authentication of edge based 5G networks. Computer communications. 199:10\u201329","DOI":"10.1016\/j.comcom.2022.12.001"},{"issue":"8","key":"4880_CR28","first-page":"4323","volume":"15","author":"SV Simpson","year":"2023","unstructured":"Simpson SV, Ravi Raju Y (2023) Bhanu Rajesh Naidu, and Gopika Venu. SECURE TRUST: a blockchain-enabled trust and reputation system for malicious node detection in IOT networks. Int J Inform Technol 15(8):4323\u20134336","journal-title":"Int J Inform Technol"},{"key":"4880_CR29","doi-asserted-by":"crossref","unstructured":"Hemani D, Singh, Rajendra Kumar D (2024) Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts. Int J Inform Technol: 1\u201317","DOI":"10.1007\/s41870-023-01712-x"},{"key":"4880_CR30","doi-asserted-by":"crossref","unstructured":"Das D, Banerjee S, Dasgupta K, Chatterjee P, Ghosh U, Utpal Biswas (2023) Blockchain enabled sdn framework for security management in 5\u00a0g applications. In Proceedings of the 24th International Conference on Distributed Computing and Networking, pp. 414\u2013419","DOI":"10.1145\/3571306.3571445"},{"key":"4880_CR31","doi-asserted-by":"crossref","unstructured":"Chandan R, Raman A, Balobaid NLS, Cherukupalli, Gururaj HL Francesco Flammini, and Rajesh Natarajan., 2023 Secure modern wireless communication network based on blockchain technology. Electronics 12, no. 5, 1095","DOI":"10.3390\/electronics12051095"},{"issue":"3","key":"4880_CR32","first-page":"1581","volume":"16","author":"V Kumar","year":"2024","unstructured":"Kumar V, Ali R, Pawan Kumar Sharma (2024) A secure blockchain-assisted authentication framework for electronic health records. Int J Inform Technol 16(3):1581\u20131593","journal-title":"Int J Inform Technol"},{"key":"4880_CR33","doi-asserted-by":"crossref","unstructured":"Chandra T, Kaur M, Rakesh N, Gulhane M, Maurya S (2024) Novel blockchain-based framework to publish, verify, and store digital academic credentials of universities. Int J Inform Technol: 1\u20139","DOI":"10.1007\/s41870-024-01842-w"},{"key":"4880_CR34","doi-asserted-by":"crossref","unstructured":"Moudoud H, Cherkaoui S, Lyes Khoukhi (2022) An Overview of Blockchain and 5G Networks. Computational Intelligence in Recent Communication Networks: pp. 1\u201320. ss","DOI":"10.1007\/978-3-030-77185-0_1"},{"key":"4880_CR35","doi-asserted-by":"crossref","unstructured":"Wadud MA, Hussen T, Ahmed A, Hossen MM, Hasan MA, Islam, Md Hasibur Rahman (2023) A blockchain-based secured land record system using hyperledger fabric. In The Fourth Industrial Revolution and Beyond: Select Proceedings of IC4IR+, pp. 171\u2013184","DOI":"10.1007\/978-981-19-8032-9_13"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-024-04880-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-024-04880-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-024-04880-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T08:29:24Z","timestamp":1740817764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-024-04880-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["4880"],"URL":"https:\/\/doi.org\/10.1007\/s12652-024-04880-1","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"3 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}