Security analysis of 5G network authentication and key negotiation protocol. Literature review

Authors

  • Longye Wang Author

DOI:

https://doi.org/10.61173/4ecfxb24

Keywords:

5G network, authentication and key negoti-ation protocols, security analysis, privacy protection, for-mal verification, man-in-the-middle attack

Abstract

This study focuses on the security of 5G network authentication and key negotiation protocols, reviewing existing research findings. It examines the security issues of 5G-AKA and EAP-AKA 'from the protocol's perspective, summarizing formal verification methods and improvement measures. In terms of the integration of emerging technologies, it explores how blockchain and quantum key distribution enhance 5G security and their application progress. The paper highlights the current research's shortcomings in adapting to real-world scenarios and addressing new threats, providing direction for further 5G network security research. This will help solidify the foundation of 5G security and promote its reliable application in critical areas.

Downloads

Published

2025-08-26

Issue

Section

Articles