{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:54:34Z","timestamp":1774558474307,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute of Information and Communications Technology Planning and Evaluation (IITP) grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korea Government (MSIT)","award":["2022-0-00103"],"award-info":[{"award-number":["2022-0-00103"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2025.3647712","type":"journal-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:30:59Z","timestamp":1766514659000},"page":"21-37","source":"Crossref","is-referenced-by-count":0,"title":["Toward Quantum-Safe 6G Mobile Networks: A Survey on EAP-AKA Prime Family With Formal Security Analysis and Empirical Evaluation"],"prefix":"10.1109","volume":"72","author":[{"given":"Hoseok","family":"Kwon","sequence":"first","affiliation":[{"name":"Department of Cyber Security, Kookmin University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4905-6912","authenticated-orcid":false,"given":"Yongho","family":"Ko","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Kookmin University, Seoul, South Korea"}]},{"given":"I.","family":"Wayan Adi Juliawan Pawana","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Kookmin University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Kookmin University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"IMT Towards 2030 and Beyond (IMT-2030)","year":"2023"},{"key":"ref2","article-title":"Toward secure 6G communication networks: Security and privacy challenges and solutions","author":"Dang","year":"2022","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"ref3","volume-title":"5G Infrastructure Market Size, Share & Industry Analysis, By Communication Infrastructure (ran, Transport Technology, and Core Technology), By Spectrum Band (Low Band (<1 GHZ), Mid Band (1-6GHZ), and High Band (24-40 GHZ)), By Network Architecture (Non-Standalone and Standalone), By End User (residential, Commercial, Industrial, and Government), and Regional Forecast,2024\u20132032","year":"2024"},{"key":"ref4","volume-title":"Plotting the Path To 6G and Supporting the Next Generation of Wireless","year":"2025"},{"key":"ref5","volume-title":"North American 6G Roadmap Priorities","year":"2024"},{"key":"ref6","volume-title":"MSIT Launches the K-Network 2030 Strategy","year":"2023"},{"key":"ref7","volume-title":"Hexa-X: Flagship 6G Research Project of the European Union","year":"2024"},{"key":"ref8","volume-title":"Joint Statement Endorsing Principles for 6G: Secure, Open, and Resilient By Design","year":"2024"},{"key":"ref9","volume-title":"3G Security; Security Architecture Ts33.102 V17.4.0","year":"2023"},{"key":"ref10","volume-title":"3GPP System Architecture Evolution (SAE); Security Architecture Ts33.401 V17.11.0","year":"2024"},{"key":"ref11","volume-title":"Security Architecture and Procedures for 5G System Ts33.501 V18.2.0","year":"2023"},{"key":"ref12","volume-title":"Study on Authentication Enhancements in the 5G System (5GS)","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s24247979"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3567439"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/info13030125"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref17","volume-title":"CYBER; Impact of Quantum Computing on Cryptographic Security Proofs","year":"2024"},{"key":"ref18","volume-title":"CYBER; Impact of Quantum Computing on Symmetric Cryptography","year":"2025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3473542"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3413768"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3377550"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528540"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13214258"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57916-5_9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23020-2_14"},{"key":"ref26","volume-title":"CYBER; A Repeatable Framework for Quantum-Safe Migrations","year":"2024"},{"key":"ref27","volume-title":"CYBER; Quantum-safe Hybrid Key Establishment","year":"2025"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3320282"},{"key":"ref29","volume-title":"ETSI TR 103 966 V1.1.1 (2024\u201302): Quantum Safe Cryptography; Migration Strategies and Recommendations","year":"2024"},{"key":"ref30","volume-title":"Study on the Evolution of 5G Security for 6G (Release 18)","year":"2024"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.010.2300433"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s22124525"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089507"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3351221"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3391667"},{"issue":"1","key":"ref36","doi-asserted-by":"crossref","first-page":"159","DOI":"10.3390\/s24010159","article-title":"5G-AKA-FS: A 5G authentication and key agreement protocol for forward secrecy","volume":"24","author":"You","year":"2023","journal-title":"Sensors"},{"key":"ref37","article-title":"5G-AKA-HPQC: Hybrid post-quantum cryptography protocol for quantum-resilient 5G primary authentication with forward secrecy","author":"Ko","year":"2025","journal-title":"arXiv:2502.02851"},{"key":"ref38","volume-title":"Extensible Authentication Protocol (EAP) Method for 3GPP Mobile Networks With Pseudonym Support and Re-authentication (EAP-AKA)","author":"Sethi","year":"2023"},{"key":"ref39","volume-title":"Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) in EAP-AKA Prime","author":"Reddy"},{"key":"ref40","volume-title":"Enhancing Security in EAP-AKA\u2019 With Hybrid Post-Quantum Cryptography","year":"2024"},{"key":"ref41","volume-title":"CYBER; Deployment Considerations for Hybrid Schemes","year":"2024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"ref43","volume-title":"Proverif: Cryptographic Protocol Verifier in the Formal Model","author":"Blanchet","year":"2025"},{"key":"ref44","volume-title":"Recommendation for Key Encapsulation Mechanisms","author":"Walker","year":"2023"},{"key":"ref45","volume-title":"X-Wing: General-Purpose Hybrid Post-Quantum KEM","author":"Connolly","year":"2025"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7748","volume-title":"Elliptic Curves for Security","author":"Langley","year":"2016"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.203"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4187","volume-title":"Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)","author":"Arkko","year":"2006"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5448","volume-title":"Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)","author":"Arkko","year":"2009"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9048","volume-title":"Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA)","author":"Arkko","year":"2021"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.17487\/rfc3748","volume-title":"Extensible Authentication Protocol (EAP)","author":"Aboba","year":"2004"},{"key":"ref52","volume-title":"Information Security, Cybersecurity and Privacy Protection\u2014Verification of Cryptographic Protocols\u2014Part 1: Methodology","year":"2023"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3335385"},{"key":"ref57","volume-title":"System Architecture for the 5G System (5GS); Stage 2","year":"2024"},{"key":"ref58","volume-title":"Non-Access-Stratum (NAS) Protocol for 5G System (5GS); Stage 3","year":"2024"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3329007"},{"key":"ref60","volume-title":"Overview on Networks Supporting Quantum Key Distribution","year":"2020"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-207"},{"issue":"7","key":"ref62","first-page":"40","article-title":"Zero-trust for 5G networks: Architecture and challenges","volume":"60","author":"Shen","year":"2022","journal-title":"IEEE Commun. Mag."},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_5"},{"key":"ref64","first-page":"678","article-title":"Designing resilient post-quantum authentication protocols","volume-title":"Proc. 18th ACM Asia Conf. Comput. Commun. Secur. (AsiaCCS)","author":"Ghosh"},{"key":"ref65","volume-title":"SRSLTE: Open-Source 4G and 5G Software Radio Suite","year":"2025"},{"key":"ref66","volume-title":"Usrp B210 SDR Kit Dual","year":"2025"},{"key":"ref67","volume-title":"Open5gs: Open Source 5G Core Network","year":"2025"},{"key":"ref68","volume-title":"Openairinterface: 5G Radio Access and Core Network Software","year":"2025"},{"key":"ref69","volume-title":"Hybrid Key Exchange in TLS 1.3","author":"Stebila","year":"2020"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11313589.pdf?arnumber=11313589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:51:24Z","timestamp":1774554684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11313589\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":69,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3647712","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}