{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T15:43:58Z","timestamp":1775576638299,"version":"3.50.1"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:00:00Z","timestamp":1606089600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"AEI","award":["RTI2018-102112-B-100"],"award-info":[{"award-number":["RTI2018-102112-B-100"]}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["RTI2018-102112-B-100"],"award-info":[{"award-number":["RTI2018-102112-B-100"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,11,23]]},"abstract":"<jats:p>5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G network slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Slice Operator (SO) ruling a specific slice may want to offer a service for users meeting some requirements. It is of paramount importance to provide a robust authentication protocol, able to ensure that users meet the requirements, providing at the same time a privacy-by-design architecture. This makes even more sense having a growing density of Internet of Things (IoT) devices exchanging private information over the network. In this paper, we improve the 5G network slicing authentication using a Self-Sovereign Identity (SSI) scheme: granting users full control over their data. We introduce an approach to allow a user to prove his right to access a specific service without leaking any information about him. Such an approach is SANS, a protocol that provides nonlinkable protection for any issued information, preventing an SO or an eavesdropper from tracking users\u2019 activity and relating it to their real identities. Furthermore, our protocol is scalable and can be taken as a framework for improving related technologies in similar scenarios, like authentication in the 5G Radio Access Network (RAN) or other wireless networks and services. Such features can be achieved using cryptographic primitives called Zero-Knowledge Proofs (ZKPs). Upon implementing our solution using a state-of-the-art ZKP library and performing several experiments, we provide benchmarks demonstrating that our approach is affordable in speed and memory consumption.<\/jats:p>","DOI":"10.1155\/2020\/8823573","type":"journal-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T18:17:34Z","timestamp":1606241854000},"page":"1-8","source":"Crossref","is-referenced-by-count":15,"title":["SANS: Self-Sovereign Authentication for Network Slices"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0013-3132","authenticated-orcid":true,"given":"Xavier","family":"Salleras","sequence":"first","affiliation":[{"name":"Department of Information and Communication Technologies, Universitat Pompeu Fabra, Barcelona, Spain"},{"name":"Center for Cybersecurity Research of Catalonia (CYBERCAT), Catalonia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0583-7929","authenticated-orcid":true,"given":"Vanesa","family":"Daza","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Technologies, Universitat Pompeu Fabra, Barcelona, Spain"},{"name":"Center for Cybersecurity Research of Catalonia (CYBERCAT), Catalonia, Spain"}]}],"member":"311","reference":[{"key":"1"},{"key":"2","first-page":"291","article-title":"The knowledge complexity of interactive proof-systems","author":"S. Goldwasser"},{"key":"3"},{"key":"4","article-title":"Zether: towards privacy in a smart contract world","author":"B. B\u00fcnz","year":"2019"},{"key":"5"},{"key":"6","first-page":"103","article-title":"Non-interactive zero-knowledge and its applications","author":"M. Blum"},{"key":"7","article-title":"Succinct non-interactive zero knowledge for a von neumann architecture","author":"E. Ben-Sasson","year":"2013"},{"key":"8","article-title":"Scalable multi-party computation for zk-SNARK parameters in the random beacon model","author":"S. Bowe","year":"2017"},{"key":"9","article-title":"Bulletproofs: short proofs for confidential transactions and more","author":"B. B\u00fcnz","year":"2017"},{"key":"10","article-title":"Scalable, transparent, and post-quantum secure computational integrity","author":"E. Ben-Sasson","year":"2018"},{"key":"11","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/978-3-662-49096-9_21","article-title":"Cryptographic assumptions: a position paper","volume-title":"Theory of Cryptography","author":"S. Goldwasser","year":"2016"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-49896-5_11","article-title":"On the size of pairing-based non-interactive arguments","author":"J. Groth","year":"2016"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/3243734.3243845","article-title":"Lattice-based zk-snarks from square span programs","author":"R. Gennaro","year":"2018"},{"key":"14","article-title":"Aurora: transparent succinct arguments for R1CS","author":"E. Ben-Sasson","year":"2018"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1145\/3319535.3339817","article-title":"Sonic: zero-knowledge SNARKs from linear-size universal and updateable structured reference strings","author":"M. Maller","year":"2019"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-96878-0_24","article-title":"Updatable and universal common reference strings with applications to zk-SNARKs","author":"J. Groth","year":"2018"},{"key":"17","article-title":"Doubly-efficient zkSNARKs without trusted setup","author":"R. S. Wahby","year":"2017"},{"key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489316"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2944301"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.020"},{"key":"23","first-page":"1","article-title":"Self-sovereign identity for IoT environments: a perspective","author":"G. Fedrecheski"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"25","article-title":"Starkad and poseidon: new hash functions for zero knowledge proof systems","author":"L. Grassi","year":"2019"},{"key":"26","article-title":"LASER: lightweight And SEcure Remote keyless entry protocol (Extended version)","author":"V. Daza","year":"2019"},{"key":"27","article-title":"Pairing-friendly elliptic curves of prime order","author":"P. S. L. M. Barreto","year":"2005"},{"key":"28","article-title":"Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography","author":"A. Menezes","year":"2016"},{"key":"29","first-page":"1","article-title":"Exploration of polynomial multiplication algorithms for homomorphic encryption schemes","author":"V. Migliore"},{"key":"30","article-title":"DIZK: a distributed zero knowledge proof system","author":"H. Wu","year":"2018"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8823573.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8823573.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8823573.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T18:17:39Z","timestamp":1606241859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8823573\/"}},"subtitle":[],"editor":[{"given":"Liming","family":"Fang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,23]]},"references-count":30,"alternative-id":["8823573","8823573"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8823573","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,11,23]]}}}