{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T22:32:05Z","timestamp":1774996325629,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2024,4,6]],"date-time":"2024-04-06T00:00:00Z","timestamp":1712361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171387"],"award-info":[{"award-number":["62171387"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019M663475"],"award-info":[{"award-number":["2019M663475"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"the China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["62171387"],"award-info":[{"award-number":["62171387"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"the China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M663475"],"award-info":[{"award-number":["2019M663475"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In the realm of the fifth-generation (5G) wireless cellular networks, renowned for their dense connectivity, there lies a substantial facilitation of a myriad of Internet of Things (IoT) applications, which can be supported by the massive machine-type communication (MTC) technique, a fundamental communication framework. In some scenarios, a large number of machine-type communication devices (MTCD) may simultaneously enter the communication coverage of a target base station. However, the current handover mechanism specified by the 3rd Generation Partnership Project (3GPP) Release 16 incurs high signaling overhead within the access and core networks, which may have negative impacts on network efficiency. Additionally, other existing solutions are vulnerable to malicious attacks such as Denial of Service (DoS), Distributed Denial of Service (DDoS) attacks, and the failure of Key Forward Secrecy (KFS). To address this challenge, this paper proposes an efficient and secure handover authentication protocol for a group of MTCDs supported by blockchain technology. This protocol leverages the decentralized nature of blockchain technology and combines it with certificateless aggregate signatures to mutually authenticate the identity of a base station and a group of MTCDs. This approach can reduce signaling overhead and avoid key escrow while significantly lowering the risk associated with single points of failure. Additionally, the protocol protects device anonymity by encrypting device identities with temporary anonymous identity markers with the Elliptic Curve Diffie\u2013Hellman (ECDH) to abandon serial numbers to prevent linkage attacks. The resilience of the proposed protocol against predominant malicious attacks has been rigorously validated through the application of the BAN logic and Scyther tool, underscoring its robust security attributes. Furthermore, compared to the existing solutions, the proposed protocol significantly reduces the authentication cost for a group of MTCDs during handover, while ensuring security, demonstrating commendable efficiency.<\/jats:p>","DOI":"10.3390\/s24072331","type":"journal-article","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T06:04:58Z","timestamp":1712556298000},"page":"2331","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks"],"prefix":"10.3390","volume":"24","author":[{"given":"Ronghao","family":"Ma","sequence":"first","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu 610039, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4594-6196","authenticated-orcid":false,"given":"Jianhong","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu 610039, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-7018","authenticated-orcid":false,"given":"Maode","family":"Ma","sequence":"additional","affiliation":[{"name":"KINDI Center for Computing Research, College of Engineering, Qatar University, Doha P.O. Box 2713, Qatar"}]}],"member":"1968","published-online":{"date-parts":[[2024,4,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"102601","DOI":"10.1016\/j.cose.2021.102601","article-title":"A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks","volume":"116","author":"Yan","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MCOM.2015.7263367","article-title":"Machine-type communications: Current status and future perspectives toward 5G systems","volume":"53","author":"Shariatmadari","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1109\/COMST.2019.2916180","article-title":"Security for 5G and beyond","volume":"21","author":"Ahmad","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Sharma, A., Jain, A., and Sharma, I. (2019, January 6\u20138). Exposing the security weaknesses of fifth generation handover communication. Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India.","DOI":"10.1109\/ICCCNT45670.2019.8944864"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e3934","DOI":"10.1002\/dac.3934","article-title":"SRGH: A secure and robust group-based handover AKA protocol for MTC in LTE-A networks","volume":"32","author":"Gupta","year":"2019","journal-title":"Int. J. Commun. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"457","DOI":"10.23919\/JCIN.2020.9306019","article-title":"LEGA: A lightweight and efficient group authentication protocol for massive machine type communication in 5G networks","volume":"5","author":"Basudan","year":"2020","journal-title":"J. Commun. Inf. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2970","DOI":"10.1109\/TDSC.2022.3198723","article-title":"A novel authentication scheme supporting multiple user access for 5G and beyond","volume":"20","author":"Lai","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"10277","DOI":"10.1109\/JIOT.2020.3004300","article-title":"A flexible and lightweight group authentication scheme","volume":"7","author":"Aydin","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_9","first-page":"3491","article-title":"B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs","volume":"10","author":"Dwivedi","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102005","DOI":"10.1016\/j.phycom.2023.102005","article-title":"Blockchain-based group authentication scheme for 6G communication network","volume":"57","author":"Soni","year":"2023","journal-title":"Phys. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1109\/TVT.2023.3303201","article-title":"Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain","volume":"73","author":"Cai","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","article-title":"Design of blockchain-based lightweight V2I handover authentication protocol for VANET","volume":"9","author":"Son","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/LNET.2023.3234491","article-title":"Efficient blockchain-based group key distribution for secure authentication in VANETs","volume":"5","author":"Shawky","year":"2023","journal-title":"IEEE Netw. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2126","DOI":"10.1109\/TVT.2019.2960313","article-title":"FTGPHA: Fixed-trajectory group pre-handover authentication mechanism for mobile relays in 5G high-speed rail networks","volume":"69","author":"Ma","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_15","first-page":"13956","article-title":"FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial Integrated Networks","volume":"10","author":"Yang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"13876","DOI":"10.1109\/JIOT.2021.3068297","article-title":"Group handover for drone base stations","volume":"8","author":"Aydin","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.1109\/TIFS.2023.3256703","article-title":"Privacy-aware secure region-based handover for small cell networks in 5G-enabled mobile communication","volume":"18","author":"Alnashwan","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"21100","DOI":"10.1109\/JIOT.2023.3285402","article-title":"RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks","volume":"10","author":"Li","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chaer, A., Salah, K., Lima, C., Ray, P.P., and Sheltami, T. (2019, January 9\u201313). Blockchain for 5G: Opportunities and challenges. Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA.","DOI":"10.1109\/GCWkshps45667.2019.9024627"},{"key":"ref_20","unstructured":"(2024, March 30). Secp256k1: A Key Algorithm in Cryptocurrencies. Available online: https:\/\/www.nervos.org\/knowledge-base\/secp256k1_a_key%20algorithm_(explainCKBot)."},{"key":"ref_21","unstructured":"(2024, March 30). 3GPP TS 23.501 Release 16. Available online: https:\/\/www.3gpp.org\/specifications-technologies\/releases\/release-16."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MWC.2016.7422408","article-title":"5G ultra-dense cellular networks","volume":"23","author":"Ge","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/LCOMM.2008.071316","article-title":"Adaptive hysteresis using mobility correlation for fast handover","volume":"12","author":"Lee","year":"2008","journal-title":"IEEE Commun. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"ref_26","unstructured":"Cremers, C.J.F. (2024, March 30). Scyther: Semantics and Verification of Security Protocols. Available online: https:\/\/www.semanticscholar.org\/paper\/Scyther-%3A-semantics-and-verification-of-security-Cremers\/4abeecda63a90f2c39554843c8189a6cd8c4eea5."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Chow, M.C., and Ma, M. (2022). A secure blockchain-based authentication and key agreement scheme for 3GPP 5G networks. Sensors, 22.","DOI":"10.3390\/s22124525"},{"key":"ref_28","unstructured":"Barker, E. (2016). Recommendation for Key Management Part 1: General, National Institute of Standards and Technology (NIST). NIST Special Publication 800-57 Part 1 Revision 4."},{"key":"ref_29","unstructured":"(2024, March 30). 3GPP TS 22.261 Release 16. Available online: https:\/\/www.etsi.org\/deliver\/etsi_ts\/122200_122299\/122261\/16.14.00_60\/ts_122261v161400p.pdf."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TMC.2006.16","article-title":"A study of the energy consumption characteristics of cryptographic algorithms and security protocols","volume":"5","author":"Potlapally","year":"2005","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/7\/2331\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:24:05Z","timestamp":1760106245000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/7\/2331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,6]]},"references-count":30,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["s24072331"],"URL":"https:\/\/doi.org\/10.3390\/s24072331","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,6]]}}}