{"title":"Ultra lightweight post-quantum resistant 5G-AKA protocol","authors":"An Braeken","doi":"10.1016/j.comnet.2025.111444","DOIUrl":null,"url":null,"abstract":"<div><div>As constrained devices like Internet of Things (IoT) devices become increasingly integrated with 5G networks, efficient and secure authentication and key management mechanisms are essential to ensure seamless and protected communication with the core 5G infrastructure. However, the current 5G-AKA (Authentication and Key Agreement) protocol lacks resistance against perfect forward secrecy (PFS) and post-quantum security, making it vulnerable to future adversarial threats, particularly quantum-enabled attacks. Most existing research provides partial solutions addressing either PFS or post-quantum security, no approach fully resolves both issues simultaneously in an efficient manner. This paper presents a novel authentication mechanism that relies solely on symmetric key cryptography, ensuring both high performance and robust security. Our innovation lies in replacing the conventional use of identical key material with a hybrid setup, where the user and 5G core each hold both common and distinct key components . By eliminating the computational overhead associated with asymmetric cryptography, our proposed solution offers an extremely efficient and scalable security solution, having almost 5 times lower energy consumption as the current 5G-AKA standard and requiring almost three times less security material to be sent during the protocol. As a consequence, this protocol offers a sustainable solution both with respect to energy and security aspects.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111444"},"PeriodicalIF":4.6000,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004116","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
As constrained devices like Internet of Things (IoT) devices become increasingly integrated with 5G networks, efficient and secure authentication and key management mechanisms are essential to ensure seamless and protected communication with the core 5G infrastructure. However, the current 5G-AKA (Authentication and Key Agreement) protocol lacks resistance against perfect forward secrecy (PFS) and post-quantum security, making it vulnerable to future adversarial threats, particularly quantum-enabled attacks. Most existing research provides partial solutions addressing either PFS or post-quantum security, no approach fully resolves both issues simultaneously in an efficient manner. This paper presents a novel authentication mechanism that relies solely on symmetric key cryptography, ensuring both high performance and robust security. Our innovation lies in replacing the conventional use of identical key material with a hybrid setup, where the user and 5G core each hold both common and distinct key components . By eliminating the computational overhead associated with asymmetric cryptography, our proposed solution offers an extremely efficient and scalable security solution, having almost 5 times lower energy consumption as the current 5G-AKA standard and requiring almost three times less security material to be sent during the protocol. As a consequence, this protocol offers a sustainable solution both with respect to energy and security aspects.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.