Braeken, AnAnBraekenLiyanage, MadhusankaMadhusankaLiyanageKumar, PardeepPardeepKumarMurphy, JohnJohnMurphy2019-10-232019-10-232019 IEEE2019-05-06IEEE Access2169-3536http://hdl.handle.net/10197/11171The security of mobile communication largely depends on the strength of the authentication key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has standardized the 5G AKA (Authentication and Key Agreement) protocol for the next generation of mobile communications. It has been recently shown that the current version of this protocol still contains several weaknesses regarding user localization, leakage of activity, active attackers, and in the presence of malicious serving networks, leading to potentially major security leaks. We propose a new version of the 5G AKA protocol to overcome all the currently identified weaknesses in the protocol. In the new protocol, we replace the sequence numbers with random numbers, making it possible to drastically reduce the number of required communication phases and steps in the protocol. The usage of random numbers for the 5G AKA protocol is possible since the current Universal Subscriber Identity Modules (USIMs) are now capable of performing randomized asymmetric encryption operations. Moreover, the proposed protocol provides two additional security features, i.e., post-compromise security and forward security, not present in the current 5G AKA protocol. Finally, we evaluate the performance, both computation and communication efficiency, of the proposed AKA protocol and show its improvements compared to the current 5G AKA protocol.en© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.5GAuthenticationKey agreementSecurityMobile communicationFormal verificationNovel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving NetworksJournal Article7640406405210.1109/ACCESS.2019.29149412019-09-07789658318927 PCA15127CA16226https://creativecommons.org/licenses/by-nc-nd/3.0/ie/