Visible to the public Identity management using blockchain for cognitive cellular networks

TitleIdentity management using blockchain for cognitive cellular networks
Publication TypeConference Paper
Year of Publication2017
AuthorsRaju, S., Boddepalli, S., Gampa, S., Yan, Q., Deogun, J. S.
Conference Name2017 IEEE International Conference on Communications (ICC)
Keywordsaccounting, assertion, authentication, Authorization, blockchain, blockchain technology, Cellular networks, cellular radio, cloud computing, cloud-centric cognitive cellular networks, cognitive cellular network blockchain, Cognitive radio, contracts, cryptography, dynamic spectrum access, end-to-end management, Human Behavior, Identity management, integrated circuits, network signaling traffic, opportunistic network access technologies, Performance, privacy, privacy-enhancing user identity management system, Protocols, pseudonymous identities, pubcrawl, radio spectrum management, Resiliency, Scalability, spectrum crunch, telecommunication network management, telecommunication security, telecommunication signalling, telecommunication traffic
AbstractCloud-centric cognitive cellular networks utilize dynamic spectrum access and opportunistic network access technologies as a means to mitigate spectrum crunch and network demand. However, furnishing a carrier with personally identifiable information for user setup increases the risk of profiling in cognitive cellular networks, wherein users seek secondary access at various times with multiple carriers. Moreover, network access provisioning - assertion, authentication, authorization, and accounting - implemented in conventional cellular networks is inadequate in the cognitive space, as it is neither spontaneous nor scalable. In this paper, we propose a privacy-enhancing user identity management system using blockchain technology which places due importance on both anonymity and attribution, and supports end-to-end management from user assertion to usage billing. The setup enables network access using pseudonymous identities, hindering the reconstruction of a subscriber's identity. Our test results indicate that this approach diminishes access provisioning duration by up to 4x, decreases network signaling traffic by almost 40%, and enables near real-time user billing that may lead to approximately 3x reduction in payments settlement time.
DOI10.1109/ICC.2017.7996830
Citation Keyraju_identity_2017