Towards The 6G Authentication and Key Agreement (AKA) Protocol

Project Details

Layman's description

Toward 6G Technology: Unified Security Architecture

By 2030, the 6G technology is projected to be available. It will include and integrate wireless technologies from Internet of Thing (IoT) and Machine-to-Machine (M2M) domains, such as LoRaWAN and Zigbee, with more established ones like WiFi and Bluetooth as well as many advantage features inherited from mobile network technologies, e.g., 4G and 5G. The various technologies are very different at all levels and in particular in the security architecture, including Authentication and Key Agreement (AKA) protocol that essential mechanism to secure the information because they support mutual authentication between users and the network and derive cryptographic keys to protect both signaling and user data.
Progress in direction of an AKA protocol for the coming 6G cellular network fulfilling expected requirements to such protocol will be a significant step and will influence on standardisation process within The 3rd Generation Partnership Project (3GPP) and other committees. This is process where crucial decisions on AKA protocol are expected to be taken through 2024-2028 and be fundament for seamless and ultra-fast handovers and roaming’s between the wireless technologies that will become part of 6G to support new demanding applications. At the same time, algorithms to be selected must be robust against quantum computing attacks.
Research is needed to design the precise AKA protocol with quantum-safe in order to satisfy the envisioned performance and functionality of the 6G architecture. The research project aims to explore the security architectures and examine the security vulnerabilities of 6G technology which consider 6G application scenarios, e.g., Vehicle-to-everything (V2X), Device-to-Device (D2D), M2M, contribute to the future unified security architecture for 6G. Moreover, security is expected to rely on simple concepts and should allow entities and devices to authenticate and exchange keys transparently, keeping quantum computing in mind and prioritising privacy and trust.
Effective start/end date15/03/202314/03/2026


Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.