Blockchain-Based Mobility Management for LTE and Beyond

  • Han LeeEmail author
  • Maode MaEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)


If LTE has made it possible to stream music and video over mobile devices such as smartphones and tablets, 5G will enable vehicles, sensors, and other countless devices to interact and share data over the cellular network. To unleash the full potential of 5G, it is imperative to address the shortcomings of LTE in regard to mobility management. One major challenge with LTE is improving the handover performance and security. In order to enhance the performance and security of the handover process, this paper introduces an approach using blockchain for key derivation and key sharing. This novel approach, Blockchain Key Derivation Function (BKDF), ensures tighter security as well as faster handover between the base stations. With blockchain adding an extra layer of security, the network is able to securely derive the handover key and share it with the base stations and mobile devices in the pre-handover phase, which significantly reduces the number of operations required during the intra-handover phase. A formal security analysis on BKDF is conducted with the Burrows-Abadi-Needham (BAN) logic, followed by an analysis on the effectiveness of BKDF against some of the well-known types of network attacks. The simulation results confirm that BKDF reduces handover latency and improves link stability with decrease in packet loss in the intra-handover phase.


Handover Blockchain Security LTE 5G 



We appreciate the financial support from Ministry of Education, Singapore through the Academic Research Fund (AcRF) Tier 1 for the project of 2018-T1-001-092.


  1. 1.
    Duan, X., Wang, X.: Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. In: IEEE ICC 2016 Communication and Information Systems Security Symposium (2016)Google Scholar
  2. 2.
    Duan, X., Wang, X.: Authentication handover and privacy protection in 5G HetNets using software-defined networking. IEEE Commun. Mag. 53(4), 28–35 (2015)CrossRefGoogle Scholar
  3. 3.
    Tesema, F.B., Awada, A., Viering, I., Simsek, M., Fettweis, G.P.: Fast cell select for mobility robustness in intra-frequency 5G ultra dense networks. In: IEEE 27th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–7 (2016)Google Scholar
  4. 4.
    Arshad, R., et al.: Handover management in 5G and beyond : a topology aware skipping approach. IEEE Access 4, 9073–9081 (2017)CrossRefGoogle Scholar
  5. 5.
    Habbal, A., Member, S., Goudar, S.I., Hassan, S., Member, S.: Context-aware radio access technology selection in 5G ultra dense networks. IEEE Access 14(8), 1–13 (2017)Google Scholar
  6. 6.
    Wang, X., et al.: Handover reduction in virtualized cloud radio access networks using TWDM-PON fronthaul. J. Opt. Soc. Am. 8(12), 124–134 (2016)Google Scholar
  7. 7.
    Jung, M.Y., Jang, J.W.: Data management and searching system and method to provide increased security for IoT platform. In: International Conference on Information and Communication Technology. ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017, December 2017, pp. 873–878 (2017)Google Scholar
  8. 8.
    Ram Basnet, S., Shakya, S.: BSS: blockchain security over software defined network. In: IEEE ICCCA, pp. 720–725 (2017)Google Scholar
  9. 9.
    Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: International Conference on Advanced Communication Technology, ICACT, pp. 464–467 (2017)Google Scholar
  10. 10.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
  11. 11.
    Rao, V.S., Gajula, R.: Interoperable UE Handovers in LTE. Radysis (2011)Google Scholar
  12. 12.
    Secp256k1. Accessed 02 May 2018
  13. 13.
    Guo, N.A.N., Wang, X.: An anonymous authentication scheme based on PMIPv6 for VANETs. IEEE Access 6, 14686–14698 (2018)CrossRefGoogle Scholar
  14. 14.
    Jawad Alam, M., Ma, M.: DC and CoMP authentication in LTE-advanced 5G HetNet. In: Proceedings of IEEE Global Communications Conference, GLOBECOM 2017, January 2018, pp. 1–6 (2018)Google Scholar
  15. 15.
    Han, C.K., Choi, H.K.: Security analysis of handover key management in 4G LTE/SAE networks. IEEE Trans. Mob. Comput. 13(2), 457–468 (2014)CrossRefGoogle Scholar
  16. 16.
    Cichonski, J., Franklin, J.M., Bartock, M.: Guide to LTE Security. NIST Special Publication 800-187 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Nanyang Technological UniversitySingaporeSingapore

Personalised recommendations