Identity management using blockchain for cognitive cellular networks

Cloud-centric cognitive cellular networks utilize dynamic spectrum access and opportunistic network access technologies as a means to mitigate spectrum crunch and network demand. However, furnishing a carrier with personally identifiable information for user setup increases the risk of profiling in cognitive cellular networks, wherein users seek secondary access at various times with multiple carriers. Moreover, network access provisioning — assertion, authentication, authorization, and accounting — implemented in conventional cellular networks is inadequate in the cognitive space, as it is neither spontaneous nor scalable. In this paper, we propose a privacy-enhancing user identity management system using blockchain technology which places due importance on both anonymity and attribution, and supports end-to-end management from user assertion to usage billing. The setup enables network access using pseudonymous identities, hindering the reconstruction of a subscriber's identity. Our test results indicate that this approach diminishes access provisioning duration by up to 4x, decreases network signaling traffic by almost 40%, and enables near real-time user billing that may lead to approximately 3x reduction in payments settlement time.

[1]  Raju Saravanan,et al.  Achieving 5As in Cloud Centric Cognitive Cellular Networks , 2016 .

[2]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[3]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[4]  Jitender S. Deogun,et al.  Design and analysis of elastic handoff in cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[5]  Elaine Shi,et al.  On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.

[6]  Alecsandra Irimie-Ana,et al.  Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World , 2018 .

[7]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[8]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[9]  John Kleinsman,et al.  Facebook Study: A Little Bit Unethical But Worth It? , 2015, Journal of Bioethical Inquiry.

[10]  Rahul Jain,et al.  Spectrum Sharing through Contracts for Cognitive Radios , 2013, IEEE Transactions on Mobile Computing.

[11]  Madjid Nakhjiri,et al.  AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility , 2005 .

[12]  D. Wallach,et al.  Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers , 2016 .

[13]  Jon M. Peha,et al.  Sharing Spectrum Through Spectrum Policy Reform and Cognitive Radio , 2009, Proceedings of the IEEE.