{"id":"https://openalex.org/W4416549528","doi":"https://doi.org/10.1145/3719027.3744844","title":"5G-RNAKA : A Random Number-based Authentication and Key Agreement Protocol for 5G Systems","display_name":"5G-RNAKA : A Random Number-based Authentication and Key Agreement Protocol for 5G Systems","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549528","doi":"https://doi.org/10.1145/3719027.3744844"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3744844","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744844","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744844","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744844","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101798142","display_name":"Hui Li","orcid":"https://orcid.org/0000-0003-3629-0233"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3629-0233","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020215614","display_name":"Hui-Shan Li","orcid":"https://orcid.org/0009-0007-8920-311X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haotian Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0007-8920-311X","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100517469","display_name":"Ma Chi","orcid":"https://orcid.org/0009-0003-4837-7333"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Ma","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0003-4837-7333","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053228584","display_name":"Jingjing Guan","orcid":"https://orcid.org/0000-0002-6135-8052"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingjing Guan","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6135-8052","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012296390","display_name":"Jianyu Zeng","orcid":"https://orcid.org/0009-0009-3181-9362"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junchi Zeng","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0009-3181-9362","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haonan Feng","orcid":"https://orcid.org/0009-0002-0140-8342"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haonan Feng","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0002-0140-8342","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073603754","display_name":"Ziming Zhao","orcid":"https://orcid.org/0000-0002-4930-5556"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziming Zhao","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"raw_orcid":"https://orcid.org/0000-0002-4930-5556","affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101798142"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39543346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1634","last_page":"1648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8537999987602234,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8537999987602234,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.02889999933540821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.023499999195337296,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.5978000164031982},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5523999929428101},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.545799970626831},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5012000203132629},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4375},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4043999910354614},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.40290001034736633},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.3788999915122986},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.3700999915599823}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79830002784729},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6226000189781189},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.5978000164031982},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5523999929428101},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.545799970626831},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5012000203132629},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4674000144004822},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4375},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4043999910354614},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.40290001034736633},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.3788999915122986},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.3700999915599823},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.36660000681877136},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3646000027656555},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.36090001463890076},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.3521000146865845},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.30630001425743103},{"id":"https://openalex.org/C121158502","wikidata":"https://www.wikidata.org/wiki/Q4652161","display_name":"AKA","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.3018999993801117},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.28949999809265137},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.26249998807907104},{"id":"https://openalex.org/C162932704","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Synchronizing","level":3,"score":0.2587999999523163},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.25679999589920044},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.2556000053882599},{"id":"https://openalex.org/C2781327853","wikidata":"https://www.wikidata.org/wiki/Q3552547","display_name":"User equipment","level":3,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3744844","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744844","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744844","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3744844","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744844","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744844","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3387636824","display_name":null,"funder_award_id":"62472045","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8963086430","display_name":null,"funder_award_id":"2022YFB2902203","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416549528.pdf","grobid_xml":"https://content.openalex.org/works/W4416549528.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W42122073","https://openalex.org/W1979418580","https://openalex.org/W2042280942","https://openalex.org/W2045673642","https://openalex.org/W2093972407","https://openalex.org/W2134244876","https://openalex.org/W2515148583","https://openalex.org/W2535033158","https://openalex.org/W2792636363","https://openalex.org/W2802459825","https://openalex.org/W2809727329","https://openalex.org/W2906890170","https://openalex.org/W2944001547","https://openalex.org/W2963009963","https://openalex.org/W2969545733","https://openalex.org/W2985691241","https://openalex.org/W2987215725","https://openalex.org/W3043271373","https://openalex.org/W3127402307","https://openalex.org/W3129371464","https://openalex.org/W3176721475","https://openalex.org/W3192056410","https://openalex.org/W3195333310","https://openalex.org/W4285195112","https://openalex.org/W4302010741","https://openalex.org/W4306179655","https://openalex.org/W4321609174","https://openalex.org/W4353095441","https://openalex.org/W4387870622","https://openalex.org/W4388857026","https://openalex.org/W4402957804"],"related_works":[],"abstract_inverted_index":{"The":[0],"5G-AKA":[1],"protocol,":[2],"defined":[3],"by":[4,82,119,128],"3GPP":[5],"for":[6,67,94,191,205],"authentication":[7],"and":[8,20,31,63,76,163,175,184],"key":[9],"agreement":[10],"in":[11,89,102,199],"5G":[12,68,90],"networks,":[13],"remains":[14],"vulnerable":[15],"to":[16,45,111,140,207],"linkability,":[17],"synchronization":[18],"failure,":[19],"Sequence":[21],"Number":[22],"(SQN)":[23],"exposure":[24],"attacks.":[25],"These":[26],"issues":[27],"threaten":[28],"user":[29,126],"privacy":[30,127],"service":[32,108],"availability.":[33],"Existing":[34],"improvements":[35],"often":[36],"retain":[37],"these":[38],"flaws":[39],"or":[40],"cause":[41],"high":[42],"overhead":[43],"due":[44],"continued":[46],"use":[47],"of":[48,148,160],"the":[49,83,103,107,116,121,138,142,146,166],"legacy":[50],"SQN":[51,74,122],"mechanism":[52],"from":[53,106,131],"3G.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"propose":[59],"5G-RNAKA,":[60],"a":[61],"secure":[62],"efficient":[64],"AKA":[65],"protocol":[66],"systems.":[69],"Unlike":[70],"5G-AKA,":[71],"5G-RNAKA":[72,124,155,180],"eliminates":[73],"counters":[75],"instead":[77],"utilizes":[78],"random":[79,98],"numbers":[80],"generated":[81],"Universal":[84],"Subscriber":[85],"Identity":[86],"Module":[87],"(USIM)":[88],"User":[91],"Equipment":[92],"(UE)":[93],"session":[95],"identification.":[96],"This":[97],"number":[99],"is":[100],"embedded":[101],"reply":[104],"message":[105],"network":[109],"(SN)":[110],"prevent":[112],"replay":[113],"attacks":[114],"against":[115],"UE.":[117],"Additionally,":[118],"removing":[120],"mechanism,":[123],"enhances":[125],"preventing":[129],"attackers":[130],"linking":[132],"challenge-response":[133],"sessions.":[134],"It":[135],"also":[136],"enables":[137],"UE":[139],"authenticate":[141],"SN,":[143],"effectively":[144],"mitigating":[145],"risk":[147],"SN":[149],"impersonation.":[150],"We":[151],"formally":[152],"verify":[153],"that":[154,179],"achieves":[156],"its":[157,203],"security":[158],"goals":[159],"privacy,":[161],"authentication,":[162,201],"secrecy":[164],"using":[165],"state-of-the-art":[167],"formal":[168],"verification":[169],"tool,":[170],"Tamarin":[171],"Prover.":[172],"Our":[173],"implementation":[174],"evaluation":[176],"further":[177],"demonstrate":[178],"improves":[181],"communication":[182],"efficiency":[183],"reduces":[185],"storage":[186],"overhead.":[187],"While":[188],"primarily":[189],"designed":[190],"5G,":[192],"5G-RNAKA's":[193],"features":[194],"align":[195],"with":[196],"emerging":[197],"trends":[198],"6G":[200,209],"suggesting":[202],"potential":[204],"adaptation":[206],"future":[208],"architectures.":[210]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-23T00:00:00"}
