Preprint
Article

This version is not peer-reviewed.

Security and Privacy Issues in 5G Authentication and Key Agreement (AKA) Protocol

Submitted:

29 November 2025

Posted:

02 December 2025

You are already at the latest version

Abstract
5G is the fastest-growing generation and the future of telecommunications. In the following years, when it is completely developed, it will be used by a large number of individuals all over the world. But 5G has a lot of security and privacy issues. As a result, it's critical to properly identify existing security weaknesses and provide effective solutions to address them. Some security and privacy issues still exist in the standard 5G AKA protocol, which have been identified and addressed in recent literature. By taking advantage of those vulnerabilities of the protocol, an adversary can perform some attacks such as SUCI replay attack, parallel session attack, linkability attack, etc. As a result, this standard protocol cannot ensure the location confidentiality of the subscriber. In the recent literature, researchers have provided some effective ways to mitigate the vulnerabilities of the protocol. However, the standard 5G AKA protocol still has a number of security issues that are either partially or entirely unsolved. In this paper, those issues have been addressed, and a security-enhanced 5G AKA protocol has been proposed which can mitigate the vulnerabilities of the AKA protocol. The proposed protocol may now be able to prevent such attacks and ensure the location confidentiality of the subscriber.
Keywords: 
;  ;  ;  ;  ;  ;  ;  
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated