An Efficient ECC-Based Multi-Server Authentication Scheme for 5G Environment without Online Registration Server

Document Type : Research Article

Authors

Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran.

10.22042/isecure.2026.240528
Abstract
Multi-Server Authentication and Key Agreement (MAKA) protocols in 5G networks play a pivotal role in securing communications due to their widespread applications in domains such as drones, cellular networks, and secure communications. We propose a novel and efficient protocol for multi-server authentication and key agreement in 5G networks, based on Elliptic Curve Cryptography (ECC). The proposed protocol is secure against attacks such as user and server impersonation, password guessing, insider attacks, tracking, session key disclosure, replay, denial-of-service, and man-in-the-middle attacks. Additionally, distinctive features such as user anonymity, avoidance of bilinear pairing, key confirmation, perfect forward secrecy, and the ability to perform authentication without an online registration server make the proposed scheme more efficient and secure, compared to previous schemes. Formal analysis using Proverif cryptographic protocol verifier, confirms the protocol’s confidentiality and authentication properties, while its computational and communication efficiency demonstrates relative superiority over comparable schemes. 

Keywords


[1] Y. Liu, L. Huo, and G. Zhou, “TR-AKA: A twophased, registered authentication and key agreement protocol for 5G mobile networks,” IET Information Security, vol. 16, no. 3, pp. 193–207, 2022.
[2] Ericsson, “Ericsson Mobility Report,” June 2024. [Online]. Available: https: //www.ericsson.com/en/reports-andpapers/mobility-report
[3] Y. Xiao and S. Gao, “5GAKA-LCCO: a secure 5G authentication and key agreement protocol with less communication and computation overhead,” Information, vol. 13, no. 5, p. 257, 2022.
[4] S. K. Palit, M. Chakraborty, and S. Chakraborty, “Performance analysis of 5GMAKA: A lightweight mutual authentication and key agreement scheme for 5G network,” The Journal of Supercomputing, vol. 79, no. 4, pp. 3902–3935, 2023.
[5] J. Zhang, Y. Li, and X. Wang, “Efficient multiserver authentication protocols for 5G-enabled IoT networks,” IEEE Transactions on Network Science and Engineering, vol. 10, no. 2, pp. 1234– 1245, 2023.
[6] Y. Liu, M. Zhao, and X. Li, “Resilient MAKA protocol design for 5G multi-server architecture,” Journal of Network and Computer Applications, vol. 215, p. 103350, 2023.
[7] I. ul Haq, J. Wang, Y. Zhu, and S. Maqbool, “A survey of authenticated key agreement protocols for multi-server architecture,” Journal of Information Security and Applications, vol. 55, p. 102639, 2020.
[8] 3GPP TS 33.501, “Security architecture and procedures for 5G system,” 2019.
[9] L.-H. Li, L.-C. Lin, and M.-S. Hwang, “A remote password authentication scheme for multiserver architecture using neural networks,” IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498–1504, 2001.
[10] D. Yang and B. Yang, “A biometric passwordbased multi-server authentication scheme with smart card,” in 2010 International Conference on Computer Design and Applications, vol. 5, pp. V5-554–V5-558, IEEE, 2010.
[11] S. K. H. Islam, “A provably secure ID-based mutual authentication and key agreement scheme formobilemulti-serverenvironmentwithoutESL attack,” Wireless Personal Communications, vol. 79, no. 3, pp. 1975–1991, 2014.
[12] R. Amin, S. K. H. Islam, M. S. Obaidat, G. P. Biswas, and K.-F. Hsiao, “An anonymous and robust multi-server authentication protocol using multiple registration servers,” International Journal of Communication Systems, vol. 30, no. 18, e3457, 2017.
[13] A. Kumar and H. Om, “An improved and secure multiserver authentication scheme based on biometricsandsmartcard,” Digital Communications and Networks, vol. 4, no. 1, pp. 27–38, 2018.
[14] T.-Y. Wu, Z. Lee, M. S. Obaidat, S. Kumari, S. Kumar, and C.-M. Chen, “An authenticated key agreement protocol for multi-server architecture in 5G networks,” IEEE Access, vol. 8, pp. 28096– 28108, 2020.
[15] P. K. Roy and A. Bhattacharya, “A lightweight multi-server authentication and key agreement protocol based on group key (MAKA) for multiserver environment,” The Journal of Supercomputing, pp. 1–28, 2022.
[16] Y. Xiao and S. Gao, “5GAKA-LCCO: A secure 5G authentication and key agreement protocol withlowcomputationalandcommunicationoverhead,” Information, vol. 13, no. 5, p. 257, 2022.
[17] M. M. Modiri, M. Salmasizadeh, J. Mohajeri, and B. H. Khalaj, “Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks,” Computer Communications, vol. 215, pp. 11–23, 2023.
[18] W. Wang, H. Huang, F. Xiao, Q. Li, and L. Xue, “An adaptive secure handover authenticated key agreement for multi-server architecture communication applications,” IEEE Transactions on Vehicular Technology, vol. 71, no. 9, pp. 9830– 9839, 2022.
[19] M. Jaberi, H. Mala, and S. M. S. Madani, “Cryptanalysis of two authenticated key agreement protocols in multi-server environments,” ISeCure: The ISC International Journal of Information Security, vol. 17, no. 2, pp. 179–187, 2025.

Articles in Press, Accepted Manuscript
Available Online from 12 February 2026