Review on Authentication Algorithms in Cellular Communication Networks

Authors

  • Bem Sombo Department of Computer Engineering, University of Benin, Benin City, Nigeria https://orcid.org/0000-0002-2901-708X
  • Simon Tooswem Apeh Department of Computer Engineering, University of Benin, Benin City, Nigeria
  • Isi Arthur Edeoghon Department of Computer Engineering, University of Benin, Benin City, Nigeria

DOI:

https://doi.org/10.37256/ccds.6120255673

Keywords:

authentication algorithms, cellular communication networks, 2G/3G/4G/5G authentication, cryptographic challenge-response mechanisms, SIM-based authentication, cellular network security, user-level authentication

Abstract

Black market and third-party subscriber identification module (SIM) cards are often exploited by criminals, such as kidnappers, to perpetrate their nefarious activities through cellular network services while maintaining anonymity. Authentication algorithms in cellular networks are designed to ensure that only users with valid SIMs can access network services. However, vulnerabilities in these algorithms allow perpetrators to bypass security measures. This paper reviews authentication algorithms across different generations of cellular networks, including second generation (2G), third generation (3G), fourth generation (4G) and fifth generation (5G). It explains the cryptographic challenge-response mechanism fundamental to these systems and highlights the detailed authentication procedures for each network generation. The review compares these procedures in terms of computational and communication overheads and their resistance to various attacks. Furthermore, it identifies common vulnerabilities that enable perpetrators to exploit these systems while remaining anonymous. The analysis reveals that while advancements in network generations have introduced more robust cryptographic techniques, they also increase computational and communication overheads. Importantly, the authentication algorithms primarily authenticate SIM cards rather than users, leaving room for exploitation. This review offers insights for improving authentication algorithms by incorporating user-level authentication, enhancing security in existing and future network generations, including 6G and beyond.

Downloads

Published

2024-12-23

How to Cite

1.
Bem Sombo, Simon Tooswem Apeh, Isi Arthur Edeoghon. Review on Authentication Algorithms in Cellular Communication Networks. Cloud Computing and Data Science [Internet]. 2024 Dec. 23 [cited 2025 Jan. 2];6(1):54-66. Available from: https://ojs.wiserpub.com/index.php/CCDS/article/view/5673