{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:18:26Z","timestamp":1775326706981,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61741216, 61402367"],"award-info":[{"award-number":["No.61741216, 61402367"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Science and Technology Co-ordination &amp; Innovation Project","award":["No.2016KTTSGY01-03"],"award-info":[{"award-number":["No.2016KTTSGY01-03"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["No. 2018YFC08242-04"],"award-info":[{"award-number":["No. 2018YFC08242-04"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authentication and key agreement) protocol. However, there may still be some shortcomings in the latest version of the 5G AKA protocol. According to the analysis of the latest version of the 5G AKA protocol, this paper points out seven of its shortcomings. To overcome these shortcomings, an improved primary authentication and key agreement protocol for 5G networks is proposed, which is named 5G-IPAKA. Compared with the latest version of the 5G AKA protocol, the main improvements include that the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key as the pre-shared key, the challenge-\u2013response mechanism for the serving network (SN) is added, the mutual authentication and key confirmation occurs between the UE and the SN, and the message authentication code (MAC) failure procedure is replaced with a timeout mechanism on the HN. Then, the 5G-IPAKA protocol is proven secure in the mixed strand space model for mixed protocols. Further discussion and comparative analysis show that the 5G-IPAKA protocol can overcome the above shortcomings of the latest version of the 5G AKA protocol, and is better than the recently improved 5G AKA protocols. Additionally, the 5G-IPAKA protocol is efficient and backward-compatible.<\/jats:p>","DOI":"10.3390\/info13030125","type":"journal-article","created":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T08:37:16Z","timestamp":1646210236000},"page":"125","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9516-1947","authenticated-orcid":false,"given":"Yuelei","family":"Xiao","sequence":"first","affiliation":[{"name":"School of Modern Posts, Xi\u2019an University of Post and Telecommunications, Xi\u2019an 710061, China"},{"name":"Shaanxi Provincial Information Engineering Research Institute, Xi\u2019an 710075, China"}]},{"given":"Yang","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer, Xi\u2019an University of Post and Telecommunications, Xi\u2019an 710061, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,2]]},"reference":[{"key":"ref_1","first-page":"133","article-title":"Review and trends of 5G security technology","volume":"46","author":"Xu","year":"2020","journal-title":"Radio Commun. Technol."},{"key":"ref_2","unstructured":"(2022, January 26). 3GPP TS 33.102: 3G Security. Security Architecture. Available online: https:\/\/www.3gpp.org\/DynaReport\/33102.htm."},{"key":"ref_3","unstructured":"(2022, January 26). 3GPP TS 33.401: 3GPP System Architecture Evolution (SAE). Security Architecture. Available online: https:\/\/www.3gpp.org\/DynaReport\/33401.htm."},{"key":"ref_4","unstructured":"(2022, January 26). 3GPP TS 33.501: 3GPP System Architecture Evolution (SAE). Security Architecture. Available online: https:\/\/www.3gpp.org\/DynaReport\/33501.htm."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","article-title":"Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes","volume":"101","author":"Ferrag","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"24956","DOI":"10.1109\/ACCESS.2019.2899254","article-title":"Security and protocol exploit analysis of the 5G specifications","volume":"7","author":"Jover","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1109\/COMST.2019.2916180","article-title":"Security for 5G and beyond","volume":"21","author":"Ahmad","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions","volume":"22","author":"Khan","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Hussain, S.R., Echeverria, M., Karim, I., Chowdhury, O., and Berino, E. (2019, January 11\u201315). 5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK.","DOI":"10.1145\/3319535.3354263"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Hussain, S.R., Echeverria, M., Chowdhury, O., Li, N., and Bertino, E. (2019, January 24\u201327). Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref_11","first-page":"102537","article-title":"A survey of subscription privacy on the 5G radio interface-the past, present and future","volume":"53","author":"Khan","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_12","unstructured":"Dehnel-Wild, M., and Cremers, C. (2018). Security Vulnerability in 5G-AKA Draft, Department of Computer Science, University of Oxford."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013, January 13\u201319). The Tamarin prover for the symbolic analysis of security protocols. Proceedings of the 25th International Conference on Computer Aided Verification, Saint Petersburg, Russia.","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., and Stettler, V. (2018, January 15\u201319). A formal analysis of 5G authentication. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243846"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Liu, F., Peng, J., and Zuo, M. (2018, January 1\u20133). Toward a secure access to 5G network. Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), New York, NY, USA.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00156"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"108","DOI":"10.2478\/popets-2019-0039","article-title":"New privacy threat on 3G, 4G, and upcoming 5G AKA Protocols","volume":"3","author":"Borgaonkar","year":"2019","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Cremers, C., and Dehnel-Wild, M. (2019, January 24\u201327). Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23394"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Koutsos, A. (2019, January 17\u201319). The 5G-AKA authentication protocol privacy. Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden.","DOI":"10.1109\/EuroSP.2019.00041"},{"key":"ref_19","unstructured":"Bana, G., and Comon-Lundh, H. (April, January 24). Towards unconditional soundness: Computationally complete symbolic attacker. Proceedings of the First international conference on Principles of Security and Trust (ETAPS), Tallinn, Estonia."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bana, G., and Comon-Lundh, H. (2014, January 3\u20137). A computationally complete symbolic attacker for equivalence properties. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660276"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"64040","DOI":"10.1109\/ACCESS.2019.2914941","article-title":"Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks","volume":"7","author":"Braeken","year":"2019","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Gharsallah, I., Smaoui, S., and Zarai, F. (2019, January 24\u201328). A secure efficient and lightweight authentication protocol for 5G cellular networks: SEL-AKA. Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766448"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1587\/transinf.2019EDL8190","article-title":"A security enhanced 5G authentication scheme for insecure channel","volume":"103","author":"Hu","year":"2020","journal-title":"Trans. Inf. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1806","DOI":"10.1587\/transinf.2019FOL0001","article-title":"A vulnerability in 5G authentication protocols and its Countermeasure","volume":"103","author":"Hu","year":"2020","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Edris, E.K.K., Aiash, M., and Loo, J.K. (2020, January 20\u201323). Formal verification and analysis of primary authentication based on 5G-AKA protocol. Proceedings of the 2020 7th International Conference on Software Defined Systems (SDS), Paris, France.","DOI":"10.1109\/SDS49854.2020.9143899"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ouaissa, M., and Ouaissa, M. (2020, January 21\u201322). An improved privacy authentication protocol for 5G mobile networks. Proceedings of the 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM), Dehradun, India.","DOI":"10.1109\/ICACCM50413.2020.9212910"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Parne, B.L., Gupta, S., Gandhi, K., and Meena, S. (2020, January 14\u201317). PPSE: Privacy preservation and security efficient AKA protocol for 5G communication networks. Proceedings of the 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), New Delhi, India.","DOI":"10.1109\/ANTS50601.2020.9342780"},{"key":"ref_28","unstructured":"F\u00e1brega, F.J.T., Herzog, J.C., and Guttman, J.D. (1999, January 30). Mixed strand spaces. Proceedings of the 12th IEEE Computer Security Foundations Workshop, Mordano, Italy."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","article-title":"Strand space: Proving security protocols correct","volume":"7","author":"Herzog","year":"1999","journal-title":"J. Comput. Secur."},{"key":"ref_30","unstructured":"Herzog, J.C. (July, January 30). The Diffie-Hellman key-agreement scheme in the strand-space model. Proceedings of the 16th IEEE Computer Security Foundation Workshop, Pacific Grove, CA, USA."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/3\/125\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:30:57Z","timestamp":1760135457000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/3\/125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,2]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["info13030125"],"URL":"https:\/\/doi.org\/10.3390\/info13030125","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,2]]}}}