{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:05:49Z","timestamp":1760148349046,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,4,23]],"date-time":"2023-04-23T00:00:00Z","timestamp":1682208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101007820"],"award-info":[{"award-number":["101007820"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The attention on blockchain technology (BCT) to create new forms of relational reliance has seen an explosion of new applications and initiatives, to assure decentralized security and trust. Its potential as a game-changing technology relates to how data gets distributed and replicated over several organizations and countries. This paper provides an introduction to BCT, as well as a review of its technological aspects. A concrete application of outsource access control and pricing procedures in cellular networks, based on a decentralized access control-as-a-service solution for private cellular networks, is also presented. The application can be used by service and content providers, to provide new business models. The proposed method removes the single point of failure from conventional centralized access control systems, increasing scalability while decreasing operational complexity, regarding access control and pricing procedures. Design and implementation details of the new method in a real-world scenario using a private cellular network and a BCT system that enables smart contracts are also provided.<\/jats:p>","DOI":"10.3390\/s23094224","type":"journal-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T03:04:08Z","timestamp":1682305448000},"page":"4224","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Widening Blockchain Technology toward Access Control for Service Provisioning in Cellular Networks"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2785-9950","authenticated-orcid":false,"given":"Fariba","family":"Ghaffari","sequence":"first","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, 91120 Palaiseau, France"},{"name":"Institute of Research and Technology b-com, 35510 Cesson-S\u00e9vign\u00e9, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6600-8492","authenticated-orcid":false,"given":"Nischal","family":"Aryal","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, 91120 Palaiseau, France"},{"name":"Orange Innovation, 14000 Caen, France"}]},{"given":"Emmanuel","family":"Bertin","sequence":"additional","affiliation":[{"name":"Orange Innovation, 14000 Caen, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2962-192X","authenticated-orcid":false,"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, 91120 Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7453-4393","authenticated-orcid":false,"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, 91120 Palaiseau, France"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,23]]},"reference":[{"key":"ref_1","unstructured":"Nakamoto, S. (2023, April 12). Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Business Review 2008. Available online: https:\/\/assets.pubpub.org\/d8wct41f\/31611263538139.pdf."},{"key":"ref_2","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday, 2.","DOI":"10.5210\/fm.v2i9.548"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","article-title":"Applications of blockchains in the Internet of Things: A comprehensive survey","volume":"21","author":"Ali","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"102518","DOI":"10.1016\/j.ipm.2021.102518","article-title":"A blockchain-based code copyright management system","volume":"58","author":"Jing","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"106334","DOI":"10.1016\/j.landusepol.2022.106334","article-title":"Blockchain in real estate: Recent developments and empirical applications","volume":"121","author":"Saari","year":"2022","journal-title":"Land Use Policy"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Xi, P., Zhang, X., Wang, L., Liu, W., and Peng, S. (2022). A review of Blockchain-based secure sharing of healthcare data. Appl. Sci., 12.","DOI":"10.3390\/app12157912"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/s40854-021-00306-5","article-title":"A bibliometric review of cryptocurrencies: How have they grown?","volume":"8","year":"2022","journal-title":"Financ. Innov."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"102693","DOI":"10.1016\/j.jnca.2020.102693","article-title":"Blockchain for 5G and beyond networks: A state of the art survey","volume":"166","author":"Nguyen","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/MCOM.2014.6957145","article-title":"Design considerations for a 5G network architecture","volume":"52","author":"Agyapong","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_11","unstructured":"Donet, J.A., P\u00e9rez-Sola, C., and Herrera-Joancomart\u00ed, J. (2014). Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, 7 March 2014, Revised Selected Papers, Springer."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_13","unstructured":"Lande, S., and Zunino, R. (2018, January 14\u201320). SoK: Unraveling Bitcoin smart contracts. Proceedings of the 7th International Conference on Principles of Security and Trust, Thessaloniki, Greece."},{"key":"ref_14","unstructured":"Dumas, J.G., Lafourcade, P., Tichit, A., and Varrette, S. (2022). Les Blockchains en 50 Questions-2\u00e9d.: Comprendre le Fonctionnement de Cette Technologie, Dunod."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1145\/321479.321481","article-title":"PATRICIA\u2014Practical algorithm to retrieve information coded in alphanumeric","volume":"15","author":"Morrison","year":"1968","journal-title":"J. ACM"},{"key":"ref_16","unstructured":"Ferraiolo, D., Kuhn, D.R., and Chandramouli, R. (2003). Role-Based Access Control, Artech House."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/775265.775268","article-title":"Protection","volume":"8","author":"Lampson","year":"1974","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"ref_18","unstructured":"Levy, H.M. (2014). Capability-Based Computer Systems, Digital Press."},{"key":"ref_19","unstructured":"Samarati, P., and de Vimercati, S.C. (2000). Foundations of Security Analysis and Design: Tutorial Lectures, Springer."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S0065-2458(08)60206-5","article-title":"Role-based access control","volume":"Volume 46","author":"Sandhu","year":"1998","journal-title":"Advances in Computers"},{"key":"ref_21","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_22","unstructured":"Orange (2023, February 21). Mobile Private Network. Available online: https:\/\/www.orange-business.com\/fr\/produits\/mobile-private-networks."},{"key":"ref_23","unstructured":"Ericsson (2023, February 21). Dedicated Networks. Available online: https:\/\/www.ericsson.com\/en\/portfolio\/enterprise-wireless-solutions\/dedicated-networks."},{"key":"ref_24","unstructured":"Samsung (2023, February 21). Digital Transformation Powerd by Private Networks. Available online: https:\/\/www.samsung.com\/global\/business\/networks\/solutions\/private-networks\/."},{"key":"ref_25","unstructured":"Nokia (2023, February 21). Private Cellular Networks Can Effectively and Affordably Serve the Needs of Education. Available online: https:\/\/www.nokia.com\/blog\/private-cellular-networks-can-effectively-and-affordably-serve-the-needs-of-education\/."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Aryal, N., Ghaffari, F., Rezaei, S., Bertin, E., and Crespi, N. (November, January 31). Private Cellular Network Deployment: Comparison of OpenAirInterface with Magma Core. Proceedings of the 2022 18th International Conference on Network and Service Management (CNSM), Thessaloniki, Greece.","DOI":"10.23919\/CNSM55787.2022.9964713"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/2677046.2677053","article-title":"OpenAirInterface: A flexible platform for 5G research","volume":"44","author":"Nikaein","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_28","unstructured":"Magma (2023, February 21). Implications of the Magma Architecture Interoperability, Scale and Resilience. Available online: https:\/\/magmacore.org\/wp-content\/uploads\/sites\/5\/2022\/10\/WP_Implications_of_Magma_Architecture_092822.pdf."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/TSE.2020.2989002","article-title":"Defining smart contract defects on ethereum","volume":"48","author":"Chen","year":"2020","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_30","unstructured":"Wackerow, P. (2023, February 21). ERC-20 Token Standard. Available online: https:\/\/ethereum.org\/en\/developers\/docs\/standards\/tokens\/erc-20."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"140549","DOI":"10.1109\/ACCESS.2021.3119291","article-title":"The 51% attack on blockchains: A mining behavior study","volume":"9","author":"Orozco","year":"2021","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1109\/COMST.2020.2975999","article-title":"Exploring the attack surface of blockchain: A comprehensive survey","volume":"22","author":"Saad","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_33","unstructured":"Kaur, G., and Gandhi, C. (2020). Handbook of Research on Blockchain Technology, Elsevier."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zamani, M., Movahedi, M., and Raykova, M. (2018, January 15\u201319). Rapidchain: Scaling blockchain via full sharding. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243853"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Xu, R., Chen, Y., Blasch, E., and Chen, G. (2018). Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the IoT. Computers, 7.","DOI":"10.20944\/preprints201805.0079.v1"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"58800","DOI":"10.1109\/ACCESS.2020.2982542","article-title":"xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.future.2019.06.025","article-title":"Privacy aware decentralized access control system","volume":"101","author":"Shafeeq","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_38","first-page":"30","article-title":"The tangle","volume":"1","author":"Popov","year":"2018","journal-title":"White Pap."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"7139","DOI":"10.1109\/TII.2022.3145851","article-title":"An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things","volume":"18","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Qin, X., Huang, Y., Yang, Z., and Li, X. (2019, January 8\u201310). An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor. Proceedings of the 26th International Conference on Telecommunications (ICT), Hanoi, Vietnam.","DOI":"10.1109\/ICT.2019.8798859"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"9714","DOI":"10.1109\/ACCESS.2018.2890557","article-title":"Blockchain radio access network (B-RAN): Towards decentralized secure radio access paradigm","volume":"7","author":"Ling","year":"2019","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MNET.001.1900159","article-title":"Hash access: Trustworthy grant-free IoT access enabled by blockchain radio access networks","volume":"34","author":"Ling","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Sukhodolskiy, I., and Zapechnikov, S. (February, January 29). A blockchain-based access control system for cloud storage. Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, Russia.","DOI":"10.1109\/EIConRus.2018.8317400"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1109\/TEM.2020.2966643","article-title":"Enabling attribute revocation for fine-grained access control in blockchain-IoT systems","volume":"67","author":"Yu","year":"2020","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"112713","DOI":"10.1109\/ACCESS.2019.2929205","article-title":"A secure cloud storage framework with access control based on blockchain","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"81253","DOI":"10.1109\/ACCESS.2021.3085831","article-title":"A novel access control method via smart contracts for internet-based service provisioning","volume":"9","author":"Ghaffari","year":"2021","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4224\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:22:00Z","timestamp":1760124120000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,23]]},"references-count":46,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["s23094224"],"URL":"https:\/\/doi.org\/10.3390\/s23094224","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,4,23]]}}}