Next Article in Journal
Consistent Optimization of Blast Furnace Ironmaking Process Based on Controllability Assurance Soft Sensor Modeling
Next Article in Special Issue
Geodesic Path Model for Indoor Propagation Loss Prediction of Narrowband Channels
Previous Article in Journal
Path Loss Model for 3.5 GHz and 5.6 GHz Bands in Cascaded Tunnel Environments
Previous Article in Special Issue
An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
 
 
Article
Peer-Review Record

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks

Sensors 2022, 22(12), 4525; https://doi.org/10.3390/s22124525
by Man Chun Chow 1 and Maode Ma 2,*
Reviewer 2: Anonymous
Sensors 2022, 22(12), 4525; https://doi.org/10.3390/s22124525
Submission received: 23 May 2022 / Revised: 12 June 2022 / Accepted: 12 June 2022 / Published: 15 June 2022
(This article belongs to the Special Issue Feature Papers in Communications Section 2022)

Round 1

Reviewer 1 Report

Although the 3GPP 5G standard has been applied to the real world, it is interesting to evaluate and propose new methods focusing on incrementing the security in this scenario.

The author proposes a blockchain-based protocol to enhance the security of 5G.

The template needs to be verified if it is correct for the journal.

All acronyms need to be defined before being used.

The paragraphs do not have an identation.

It is not clear how the revocation and updating will work.

It is necessary to increase the discussion about protocol's overhead.

The conclusion section should be improved.

 

 

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Reviewer 2 Report

The subject of the article is interesting. Below are the issues that have been formulated after reading the article carefully.

- The charts in the drawings could be of a larger font;

- scection "Conclusion": could be extended to include specific research findings as this section now contains very general conclusions.

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Reviewer 3 Report

The paper proposes a new approach that improves the robustness of the 5G networks using secure blockchain-based authentication.  

The state of the art is based on 32 reference titles, from which only 12 are from the last 3 years. Considering the dynamics of the domain, I consider that it would be beneficial for the authors to increase the number of very recent reference titles, in order to anchor their research in most actual research trends.

- regarding the 5GSBA architecture, please underline the improvements with respect to the existing architecture.

- also, since

- equations presented (steps) should be numbered, with the number aligned at the right margin of the paper, and all the actors involved (parameters, notations, etc) should be explained in the text. It is not clear in the equations from section V.A.1 what the operators represent and not all the parameters are available in the accompanying text. A list explaining the significance of the operators and another one explaining the meaning of all variables involved might be an asset.

- “cryptography assumption and the Dolev-Yao adversary model” [reference is needed],

- Figure 4 - Formal Verification with Scyther - brings no information for the reader – it can be explained I the text what the formal verification is showing.

- when comparing the results with other algorithms, namely 5G-AKA, SEKA and BB-AKA 5G reference are necessary for the existing algorithms.

- at row 578 “we derive the average delays in the execution of the protocols in Figure …” – it is not clear if it has been mathematically deduced, measured, evaluated using other means. Please explain.

- same for the results shown in figure 8. How you evaluated those results.

- the formulas presented in VI.C should be written as equations. Where have you taken the constants from (have they been measured? Taken from existing literature? Other?)

- How did you evaluated the results presented in Figure 10?

- The conclusion section should be extended to highlight once again the novelty of the approach, the improvement brought and open issues / further research ideeas.

At last, but not al least, the format required by MDPI has not beeb respected, Please check it once again.

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Round 2

Reviewer 3 Report

The paper looks much better now and I consider that it can be published in a prestigious journal like Sensor.

Back to TopTop