[1] Y. Liu, L. Huo, and G. Zhou, “TR-AKA: A twophased, registered authentication and key agreement protocol for 5G mobile networks,” IET Information Security, vol. 16, no. 3, pp. 193–207, 2022.
[2] Ericsson, “Ericsson Mobility Report,” June 2024. [Online]. Available: https: //www.ericsson.com/en/reports-andpapers/mobility-report
[3] Y. Xiao and S. Gao, “5GAKA-LCCO: a secure 5G authentication and key agreement protocol with less communication and computation overhead,” Information, vol. 13, no. 5, p. 257, 2022.
[4] S. K. Palit, M. Chakraborty, and S. Chakraborty, “Performance analysis of 5GMAKA: A lightweight mutual authentication and key agreement scheme for 5G network,” The Journal of Supercomputing, vol. 79, no. 4, pp. 3902–3935, 2023.
[5] J. Zhang, Y. Li, and X. Wang, “Efficient multiserver authentication protocols for 5G-enabled IoT networks,” IEEE Transactions on Network Science and Engineering, vol. 10, no. 2, pp. 1234– 1245, 2023.
[6] Y. Liu, M. Zhao, and X. Li, “Resilient MAKA protocol design for 5G multi-server architecture,” Journal of Network and Computer Applications, vol. 215, p. 103350, 2023.
[7] I. ul Haq, J. Wang, Y. Zhu, and S. Maqbool, “A survey of authenticated key agreement protocols for multi-server architecture,” Journal of Information Security and Applications, vol. 55, p. 102639, 2020.
[8] 3GPP TS 33.501, “Security architecture and procedures for 5G system,” 2019.
[9] L.-H. Li, L.-C. Lin, and M.-S. Hwang, “A remote password authentication scheme for multiserver architecture using neural networks,” IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498–1504, 2001.
[10] D. Yang and B. Yang, “A biometric passwordbased multi-server authentication scheme with smart card,” in 2010 International Conference on Computer Design and Applications, vol. 5, pp. V5-554–V5-558, IEEE, 2010.
[11] S. K. H. Islam, “A provably secure ID-based mutual authentication and key agreement scheme formobilemulti-serverenvironmentwithoutESL attack,” Wireless Personal Communications, vol. 79, no. 3, pp. 1975–1991, 2014.
[12] R. Amin, S. K. H. Islam, M. S. Obaidat, G. P. Biswas, and K.-F. Hsiao, “An anonymous and robust multi-server authentication protocol using multiple registration servers,” International Journal of Communication Systems, vol. 30, no. 18, e3457, 2017.
[13] A. Kumar and H. Om, “An improved and secure multiserver authentication scheme based on biometricsandsmartcard,” Digital Communications and Networks, vol. 4, no. 1, pp. 27–38, 2018.
[14] T.-Y. Wu, Z. Lee, M. S. Obaidat, S. Kumari, S. Kumar, and C.-M. Chen, “An authenticated key agreement protocol for multi-server architecture in 5G networks,” IEEE Access, vol. 8, pp. 28096– 28108, 2020.
[15] P. K. Roy and A. Bhattacharya, “A lightweight multi-server authentication and key agreement protocol based on group key (MAKA) for multiserver environment,” The Journal of Supercomputing, pp. 1–28, 2022.
[16] Y. Xiao and S. Gao, “5GAKA-LCCO: A secure 5G authentication and key agreement protocol withlowcomputationalandcommunicationoverhead,” Information, vol. 13, no. 5, p. 257, 2022.
[17] M. M. Modiri, M. Salmasizadeh, J. Mohajeri, and B. H. Khalaj, “Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks,” Computer Communications, vol. 215, pp. 11–23, 2023.
[18] W. Wang, H. Huang, F. Xiao, Q. Li, and L. Xue, “An adaptive secure handover authenticated key agreement for multi-server architecture communication applications,” IEEE Transactions on Vehicular Technology, vol. 71, no. 9, pp. 9830– 9839, 2022.
[19] M. Jaberi, H. Mala, and S. M. S. Madani, “Cryptanalysis of two authenticated key agreement protocols in multi-server environments,” ISeCure: The ISC International Journal of Information Security, vol. 17, no. 2, pp. 179–187, 2025.