Review on Authentication Algorithms in Cellular Communication Networks
DOI:
https://doi.org/10.37256/ccds.6120255673Keywords:
authentication algorithms, cellular communication networks, 2G/3G/4G/5G authentication, cryptographic challenge-response mechanisms, SIM-based authentication, cellular network security, user-level authenticationAbstract
Black market and third-party subscriber identification module (SIM) cards are often exploited by criminals, such as kidnappers, to perpetrate their nefarious activities through cellular network services while maintaining anonymity. Authentication algorithms in cellular networks are designed to ensure that only users with valid SIMs can access network services. However, vulnerabilities in these algorithms allow perpetrators to bypass security measures. This paper reviews authentication algorithms across different generations of cellular networks, including second generation (2G), third generation (3G), fourth generation (4G) and fifth generation (5G). It explains the cryptographic challenge-response mechanism fundamental to these systems and highlights the detailed authentication procedures for each network generation. The review compares these procedures in terms of computational and communication overheads and their resistance to various attacks. Furthermore, it identifies common vulnerabilities that enable perpetrators to exploit these systems while remaining anonymous. The analysis reveals that while advancements in network generations have introduced more robust cryptographic techniques, they also increase computational and communication overheads. Importantly, the authentication algorithms primarily authenticate SIM cards rather than users, leaving room for exploitation. This review offers insights for improving authentication algorithms by incorporating user-level authentication, enhancing security in existing and future network generations, including 6G and beyond.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 BEM SOMBO, Simon Tooswem Apeh, Isi Arthur Edeoghon
This work is licensed under a Creative Commons Attribution 4.0 International License.