• Home
  • Basics
  • Security in NR5G
  • NR5G
  • Towards 6G
  • Advance topics
  • More
    • Home
    • Basics
    • Security in NR5G
    • NR5G
    • Towards 6G
    • Advance topics
  • Home
  • Basics
  • Security in NR5G
  • NR5G
  • Towards 6G
  • Advance topics

High level security architecture for NR

How 5G Networks Authenticate Users

 Security is one of the strongest pillars of 5G NR.
Unlike previous generations, 5G is designed from the ground up to withstand:

  • Man-in-the-Middle (MITM) attacks
  • Impersonation attacks
  • Rogue base stations (stingrays/IMSI catchers)
  • Key extraction attempts
  • Replay attacks
  • Privacy breaches
     

Here, we explore how 5G securely authenticates users, handles keys, protects the air-interface, and maintains privacy through technologies like SUCI, 5G-AKA, NAS/RRC encryption, and secure SIM/eSIM architecture.

1. 5G Security Architecture: The High-Level View

5G security is divided into three major layers:

1. Network Access Security (NAS Security)

Protects the interface between UE ↔ AMF.

2. Radio Access Security (AS Security)

Protects UE ↔ gNB RRC and user-plane data.

3. Network Domain Security + End-to-End Security

Protects inter-network traffic and vertical/enterprise applications.

5G pushes security deeper, introducing stronger algorithms, mutual authentication, and encrypted identities.

2. Authentication in 5G (5G-AKA and EAP-AKA’)

Authentication ensures:

  • The network is genuine
  • The UE is genuine
  • Keys can be safely generated
     

5G uses two authentication methods:

  1. 5G-AKA (Authentication and Key Agreement)
  2. EAP-AKA’ (Extensible Authentication Protocol)

Both provide mutual authentication, meaning:

  • UE verifies the network
  • Network verifies the UE
     

This closes the door to most MITM and IMSI-catcher attacks.

3. How 5G Protects Against Man-in-the-Middle Attacks

3.1 No IMSI Over the Air: SUCI

In 2G/3G/4G, the IMSI (permanent identity) could be intercepted by a rogue base station.
In 5G, IMSI is transformed into a SUCI (Subscription Concealed Identifier) before being transmitted.

How SUCI works:

  • UE stores the operator’s public key (in SIM/eSIM)
  • Before sending its identity:
    • IMSI (aka SUPI) is encrypted using ECIES (Elliptic Curve Integrated Encryption Scheme)
    • Random salt + operator’s public key → SUCI
  • SUCI is sent to network
  • Only the operator’s private key in the home network can decrypt it
     

This means:

✔ IMSI is never exposed
✔ Rogue base stations cannot identify or track users
✔ MITM attacks lose the ability to hijack identities

4. The 5G Handshake With The Network (5G-AKA Process)

Here is the authentication flow:

  1. UE → gNB: SUCI
    The encrypted identity is sent.
  2. gNB → AMF → AUSF/UDM: Authentication Request
    The core network retrieves the authentication vector.
  3. Home Network Generates Authentication Vector
    Contains:
    • RAND (random challenge)
    • AUTN (authentication token)
    • XRES/XRES* (expected response)
    • K_AUSF (key)
       

  1. UE Verifies Network
    UE checks AUTN → ensures the challenge is genuine.
  2. UE Generates RES*
    RES* = f (RAND, key inside SIM)
    Sent back to network.
  3. Network Compares XRES and RES**
    If they match → authentication succeeds.
     
  4. Key Hierarchy Begins
    • K_AUSF → K_SEAF
    • K_SEAF → K_AMF
    • K_AMF → derive RRC/NAS/User-plane keys
       

This mutual authentication is the root of 5G cryptographic security.

5. Which Layers Perform Encryption in 5G?

5G uses encryption at multiple layers:

5.1 NAS Encryption (UE ↔ AMF)

Protects:

  • Registration
  • Location updates
  • Identity messages
  • Mobility management
     

Encryption keys: K_NASenc, K_NASint

Algorithms: 128-NEA1/2/3 (encryption) and 128-NIA1/2/3 (integrity)

5.2 AS (Access Stratum) Encryption (UE ↔ Radio Network / gNB)

Protects:

  • RRC signaling
  • User-plane data
  • Security configuration messages
     

Encryption keys: K_RRCenc, K_UPenc, K_RRCint

Algorithms:

  • Encryption: NEA1/2/3
  • Integrity: NIA1/2/3
     

Integrity protection is applied to all signaling, but not mandatory for user-plane.

6. SIM, 5G SIM, and Embedded SIM Security Architecture

6.1 Role of the SIM (USIM / 5G-USIM)

The SIM includes:

  • IMSI/SUPI (permanent identity)
  • Operator public key (for SUCI)
  • Milliwatt-secure hardware
  • Authentication algorithm (MILENAGE, TUAK)
  • Long-term symmetric key (K)
     

The SIM’s most important job:

✔ Never expose the secret key K
✔ Perform cryptographic functions internally
✔ Store SUCI encryption keys
✔ Verify AUTN
✔ Generate RES/RES*

6.2 What is a 5G SIM (5G-USIM)?

The 5G SIM contains:

  • Additional fields for SUCI
  • Key derivation updates
  • Enhanced security algorithms
  • Better support for EAP-AKA’
  • Non-IMSI-based identities
     

6.3 Embedded SIM (eSIM)

eSIM is:

  • A programmable SIM chip soldered inside the phone
  • Remote provisioning via SM-DP+ (Subscription Manager Data Preparation)
  • Same security as SIM (hardware-level key protection)
     

Security advantages:

  • Cannot be physically removed
  • Harder to tamper
  • Supports remote authentication profile switching
     

The secret key K is still stored in secure hardware and cannot be extracted.

7. 5G Key Hierarchy (How Keys Are Derived)

Once authentication succeeds, the following keys are derived:

Root Key from SIM:

  • K (never leaves SIM)

Derived Keys:

  • K_AUSF: from K
  • K_SEAF: session-specific
  • K_AMF: signaling-level
  • K_NASenc / K_NASint
  • K_RRCenc / K_RRCint
  • K_UPenc (user-plane encryption)
     

This layered key hierarchy prevents a single key compromise from breaking the whole system.

8. How 5G Prevents Rogue Base Stations & MITM Attacks

8.1 SUCI protects identity

IMSI is never exposed → rogue stations cannot track UEs.

8.2 Mutual authentication

UE verifies the operator → fake towers fail AUTN validation.

8.3 Integrity protection

Signaling messages cannot be tampered with.

8.4 Encrypted control channels

The attacker cannot modify RRC or NAS messages.

8.5 Replay protection

Nonce + sequence numbers ensure messages cannot be replayed.

8.6 No fallback to insecure 2G

UEs can disable 2G entirely (optional), preventing downgrade attacks.


 

9. Current Challenges in 5G NR Security

Even with the strongest cellular security to date, challenges remain.

9.1 Multi-RAT attacks

Attackers force UEs to:

  • Downgrade to LTE/UMTS/2G
  • Exploit older security weaknesses
     

5G solves this partially, but device manufacturers must disable unsafe fallbacks.

9.2 Physical layer attacks

Jamming remains a real concern:

  • Sync signal jamming
  • PUCCH/PUCCH denial
  • PRACH flooding
     

9.3 Rogue gNB via unlicensed bands

In FR-U bands (5G NR-U), attackers may emulate gNBs since unlicensed band has no operator control.

9.4 SUPI/IMSI leak through side channels

Even SUCI is vulnerable to:

  • Location correlation
  • Timing analysis
  • Serving cell fingerprinting
     

9.5 MEC and Slicing introduce new attack surfaces

  • MEC applications have access to network resources
  • Slice isolation must be enforced
  • Slice compromise can cascade across networks
     

9.6 Supply-chain security

gNB vendors, firmware, and chipsets are now critical infrastructure.

9.7 Quantum security & Post-Quantum Cryptography

5G keys are not quantum-resistant.
6G aims to integrate PQC algorithms.

10. Future of NR Security (6G Enhancements)

6G research is focusing on:

  • AI-driven anomaly detection
  • Quantum-safe cryptography
  • SIM-free identity based on hardware roots
  • Zero-trust architecture
  • Physical layer fingerprinting
  • Secure NTN (Non-Terrestrial Network) authentication

5G lays a strong foundation, but 6G will expand to global, AI-native, satellite-integrated, quantum-secure networks.

Copyright © 2025 NR5G - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept