A blockchain-based user-centric identity management toward 6G networks

Guoqiang Zhang , Qiwei Hu , Yu Zhang , Tao Jiang

›› 2026, Vol. 12 ›› Issue (1) : 1 -10.

PDF
›› 2026, Vol. 12 ›› Issue (1) :1 -10. DOI: 10.1016/j.dcan.2025.05.009
Regular Papers
research-article

A blockchain-based user-centric identity management toward 6G networks

Author information +
History +
PDF

Abstract

The developing Sixth-Generation (6G) network aims to establish seamless global connectivity for billions of humans, machines, and devices. However, the rich digital service and the explosive heterogeneous connection between various entities in 6G networks can not only induce increasing complications of digital identity management, but also raise material concerns about the security and privacy of the user identity. In this paper, we design a user-centric identity management that returns the sole control to the user self and achieves identity sovereignty toward 6G networks. Specifically, we propose a blockchain-based Identity Management (IDM) architecture for 6G networks, which provides a practical method to secure digital identity management. Subsequently, we develop a fully privacy-preserving identity attribute management scheme by using zero-knowledge proof to protect the privacy-sensitive identity attribute. In particular, the scheme achieves an identity attribute hiding and verification protocol to support users in obtaining and applying their identity attributes without revealing concrete data. Finally, we analyze the security of the proposed architecture and implement a prototype system to evaluate its performance. The results demonstrate that our architecture ensures effective user digital identity management in 6G networks.

Keywords

The sixth generation (6G) network / User-centric identity management / Blockchain / Decentralized identity / Privacy preservation

Cite this article

Download citation ▾
Guoqiang Zhang, Qiwei Hu, Yu Zhang, Tao Jiang. A blockchain-based user-centric identity management toward 6G networks. , 2026, 12(1): 1-10 DOI:10.1016/j.dcan.2025.05.009

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Guoqiang Zhang: Validation, Methodology, Formal analysis, Data curation, Conceptualization. Qiwei Hu: Writing-review & editing, Resources, Methodology, Formal analysis. Yu Zhang: Writing-review & editing, Resources, Funding acquisition. Tao Jiang: Writing-review & editing, Supervision, Resources, Methodology, Funding acquisition.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

The author is an Associate Editor for [Digital Communications and Networks] and was not involved in the editorial review or the decision to publish this article.

References

[1]

G. Pujolle, P. Urien, A new generation of security for the 6G, in: Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet), IEEE, 2024, pp. 161-164.

[2]

M. Liyanage, P. Porambage, E. Zeydan, T. Senavirathne, Y. Siriwardhana, A.K. Ya- dav, B. Siniarski,Advancing security for 6G smart networks and services, in:Pro-ceedings of the 2024 Joint European Conference on Networks and Communications & 6G Summit, 2024, pp. 1169-1174.

[3]

N. González-Prelcic, M. Furkan Keskin, O. Kaltiokallio, M. Valkama, D. Dardari, X. Shen, Y. Shen, M. Bayraktar, H. Wymeersch, The integrated sensing and communi-cation revolution for 6G: vision, techniques, and applications, Proc. IEEE 112 (7) (2024) 676-723.

[4]

V.-L. Nguyen, P.-C. Lin, B.-C. Cheng, R.-H. Hwang, Y.-D. Lin, Security and privacy for 6G: a survey on prospective technologies and challenges, IEEE Commun. Surv. Tutor. 23 (4) (2021) 2384-2428.

[5]

S.R. Garzon, H. Yildiz, A. Küpper, Decentralized identifiers and self-sovereign iden-tity in 6G, IEEE Netw. 36 (4) (2022) 142-148.

[6]

D. Fett, R. Küsters, G. Schmitz, A comprehensive formal security analysis of OAuth 2.0, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Com-munications Security, CCS’16, Association for Computing Machinery, New York, NY, USA, 2016, pp. 1204-1215.

[7]

S. Farooqi, M. Musa, Z. Shafiq, F. Zaffar,Canarytrap: detecting data misuse by third-party apps on online social networks, arXiv preprint arXiv:2006.15794.

[8]

J. Ernstberger, J. Lauinger, F. Elsheimy, L. Zhou, S. Steinhorst, R. Canetti, A. Miller, A. Gervais, D. Song, Sok: data sovereignty,in:Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy, IEEE, 2023, pp. 122-143.

[9]

K.M.B. Hasan, M. Sajid, M.A. Lapina, M. Shahid, K. Kotecha, Blockchain technology meets 6 g wireless networks: a systematic survey, Alex. Eng. J. 92 ( 2024) 199-220.

[10]

C. Mazzocca, A. Acar, S. Uluagac, R. Montanari, P. Bellavista, M. Conti, A survey on decentralized identifiers and verifiable credentials, IEEE Commun. Surv. Tutor. (2025), https://doi.org/10.1109/COMST.2025.3543197, early access.

[11]

D. Maram, H. Malvai, F. Zhang, N. Jean-Louis, A. Frolov, T. Kell, T. Lobban, C. Moy, A. Juels, A. Miller, Candid: can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability, in: Proceedings of the 2021 IEEE Symposium on Security and Privacy, IEEE, 2021, pp. 1348-1366.

[12]

Y. Liu, Z. Jia, Z. Jiang, J. Liu, D. Li, Z. Guan, Q. Wu, W. Susilo, Secure 6G distributed group authentication and key agreement via sharding blockchain, IEEE Netw. 39 (2) (2024) 100-107.

[13]

X.S. Shen, D. Liu, C. Huang, L. Xue, H. Yin, W. Zhuang, R. Sun, B. Ying, Blockchain for transparent data management toward 6G, ENGINEERING-PRC 8 (2022) 74-85.

[14]

S.R. Garzon, H. Yildiz, A. Küpper, Towards decentralized identity management in multi-stakeholder 6G networks, in: Proceedings of the 2022 1st International Con-ference on 6G Networking (6GNet), IEEE, 2022, pp. 1-8.

[15]

S.R. Garzon, H. Dinh-Tuan, M.M. Martinez, A. Küpper, H.J. Einsiedler, D. Schneider, Beyond certificates: 6G-ready access control for the service-based architecture with decentralized identifiers and verifiable credentials,in:Proceedings of the 2024 Joint European Conference on Networks and Communications & 6G Summit, IEEE, 2024, pp. 830-835.

[16]

S.R. Garzon, H. Yildiz, A. Küpper,Towards decentralized identity management in multi-stakeholder 6G networks, in:Proceedings of the 2022 1st International Con-ference on 6G Networking, 2022, pp. 1-8.

[17]

S.R. Garzon, H. Yildiz, A. Küpper, Decentralized identifiers and self-sovereign iden-tity in 6G, IEEE Netw. 36 (4) (2022) 142-148.

[18]

Y. Wang, X. Kang, T. Li, H. Wang, C.-K. Chu, Z. Lei,Six-trust for 6G: toward a secure and trustworthy future network, IEEE Access 11 (2023) 107657-107668.

[19]

Z. Zhou, A. Gaurav, B.B. Gupta, M.D. Lytras, I. Razzak, A fine-grained access con-trol and security approach for intelligent vehicular transport in 6G communication system, IEEE Trans. Intell. Transp. Syst. 23 (7) (2022) 9726-9735.

[20]

M. Wazid, A.K. Das, N. Kumar, M. Alazab, Designing authenticated key management scheme in 6G-enabled network in a box deployed for industrial applications, IEEE Trans. Ind. Inform. 17 (10) (2021) 7174-7184.

[21]

G. Cheng, J. Huang, Y. Wang, J. Zhao, L. Kong, S. Deng, X. Yan, Conditional privacy-preserving multi-domain authentication and pseudonym management for 6G-enabled iov, IEEE Trans. Inf. Forensics Secur. (2023) 10206-10220.

[22]

R. Xiong, W. Ren, X. Hao, J. He, K.-K.R. Choo, Bdim: a blockchain-based decentral-ized identity management scheme for large scale Internet of things, IEEE Int. Things J. 10 (24) (2023) 22581-22590.

[23]

E.S. Fathalla, M. Azab, C. Xin, H. Wu, Pt-ssim: a proactive, trustworthy self-sovereign identity management system, IEEE Int. Things J. 10 (19) (2023) 17155-17169.

[24]

B. Zhong, H. Gao, L. Ding, Y. Wang, A blockchain-based life-cycle environmental management framework for hospitals in the covid-19 context, ENGINEERING-PRC 20 (2023) 208-221.

[25]

M. Popa, S.M. Stoklossa, S. Mazumdar, Chaindiscipline-towards a blockchain-iot-based self-sovereign identity management framework, IEEE Trans. Serv. Comput. 16 (5) (2023) 3238-3251.

[26]

H. Xu, X. Zhang, e.a. Cui, Qimei, A dynamic blockchain-based mutual authenticat-ing identity management system for next-generation network, IEEE Commun. Mag. 61 (8) (2023) 116-122.

[27]

A. Kiayias, A. Russell, B. David, R. Oliynykov, Ouroboros: a provably secure proof-of-stake blockchain protocol,in:Proceedings of the Annual International Cryptology Conference, Springer, 2017, pp. 357-388.

[28]

M. Castro, B. Liskov, Practical Byzantine fault tolerance and proactive recovery, ACM Trans. Comput. Syst. 20 (4) (2002) 398-461.

[29]

S. Bowe, A. Gabizon, I. Miers, Scalable multi-party computation for zk-snark param-eters in the random beacon model, Cryptology ePrint Archive, Paper 2017/1050, https://eprint.iacr.org/2017/1050, 2017.

[30]

A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, B. Parno, Cinderella: turning shabby x. 509 certificates into elegant anonymous credentials with the magic of verifiable computation,in:Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), IEEE, 2016, pp. 235-254.

[31]

Y. Tsiounis, M. Yung, On the security of elgamal based encryption, in: H. Imai, Y. Zheng (Proceedings of the Public Key Cryptography,Eds.), Springer Berlin Heidel-berg, Berlin, Heidelberg, 1998, pp. 117-134.

[32]

E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, et al., Hyperledger fabric: a dis-tributed operating system for permissioned blockchains,in: Proceedings of the Thir-teenth EuroSys Conference, 2018, pp. 1-15.

[33]

L. Grassi, D. Khovratovich, C. Rechberger, A. Roy, M. Schofnegger, Poseidon: a new hash function for zero-knowledge proof systems, Cryptology ePrint Archive, Paper 2019/458, https://eprint.iacr.org/2019/458, 2019.

[34]

J. Groth, On the size of pairing-based non-interactive arguments, in:Proceedings of the Advances in Cryptology-EUROCRYPT 2016: 35th Annual International Confer-ence on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, vol. 35, Springer, 2016, pp. 305-326.

[35]

Z. Bao, D. He, M.K. Khan, M. Luo, Q. Xie, Pbidm: privacy-preserving blockchain-based identity management system for industrial Internet of things, IEEE Trans. Ind. Inform. 19 (2) (2023) 1524-1534.

[36]

H. Deng, J. Liang, C. Zhang, X. Liu, L. Zhu, S. Guo, Futuredid: a fully decentralized identity system with multi-party verification, IEEE Trans. Comput. 73 (8) (2024) 2051-2065.

PDF

18

Accesses

0

Citation

Detail

Sections
Recommended

/