{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:03:39Z","timestamp":1766066619652,"version":"build-2065373602"},"reference-count":70,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T00:00:00Z","timestamp":1472169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA), evolved packet system-authentication and key agreement (EPS-AKA), and long term evolution-authentication and key agreement (LTE-AKA) algorithms for 3rd generation partnership project (3GPP) systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC) which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI) is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.<\/jats:p>","DOI":"10.3390\/sym8090085","type":"journal-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T09:58:48Z","timestamp":1472205528000},"page":"85","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems"],"prefix":"10.3390","volume":"8","author":[{"given":"Mohammed","family":"Ramadan","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Gaoxin West Zone, Chengdu 611731, China"},{"name":"School of Electronic Engineering, Chengdu University of Information Technology, Xuefu Road, Chengdu 610225, China"}]},{"given":"Guohong","family":"Du","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Chengdu University of Information Technology, Xuefu Road, Chengdu 610225, China"}]},{"given":"Fagen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Gaoxin West Zone, Chengdu 611731, China"}]},{"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Gaoxin West Zone, Chengdu 611731, China"}]}],"member":"1968","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Mitchell, C.J. (2004). Security for Mobility, Institute of Electrical Engineers.","DOI":"10.1049\/PBTE051E"},{"key":"ref_2","unstructured":"(2001). 3GPP TS 33.120 (4.0.0), 3G Security: Security Principles and Objectives, 3GPP Organizational Partners. Release 4."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/JCN.2011.6157409","article-title":"PEC: A privacy preserving emergency call scheme for mobile healthcare social networks","volume":"13","author":"Liang","year":"2011","journal-title":"J. Commun. Netw."},{"key":"ref_4","unstructured":"(2001). 3GPP TS 21.133, 3GPP: Technical Specification Group Services and System Aspects, 3GPP Organizational Partners. 3G Security; Security Threats and Requirements."},{"key":"ref_5","unstructured":"Millan, W. (1998, January 18\u201319). Cryptanalysis of the alleged CAVE algorithm. Proceedings of the 1st International Conference on Information Security and Cryptology (ICSCI \u201998), Seoul, Korea."},{"key":"ref_6","unstructured":"Lauri, P. (1999). GSM Interception, Helsinki University of Technology. Lecture Notes."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Wagner, D., Schneier, B., and Kelsey, J. (1997, January 17\u201321). Cryptanalysis of the cellular message encryption algorithm. Proceedings of the 17th international conference on cryptology (Crypto\u201997), Santa Barbara, CA, USA.","DOI":"10.1007\/BFb0052260"},{"key":"ref_8","unstructured":"(2002). 3GPP Technical Specification: 3GPP TS 33.102, V5.3.0, Third Generation Partnership Project; Technical Specifications Group Services and System Aspects; 3G Security; Security Architecture, 3GPP Organizational Partners."},{"key":"ref_9","unstructured":"(2006). 3GPP Technical Report: 3GPP TR 31.900, V5.3.0. Third Generation Partnership Project; SIM\/USIM Internal and External Interworking Aspects; ETSI 3rd Generation Partnership Project (3GPP), 3GPP Organizational Partners."},{"key":"ref_10","unstructured":"(2005). 3GPP Technical Specification: 3GPP TS 33.200 version 6.1.0 Release 6, Third Generation Partnership Project; Universal Mobile Telecommunications System (UMTS); 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security; ETSI 3rd Generation Partnership Project (3GPP), 3GPP Organizational Partners."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Meyer, U., and Wetzel, S. (2004, January 1). A Man-in-the-Middle Attack on UMTS. Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, USA.","DOI":"10.1145\/1023646.1023662"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TWC.2004.842941","article-title":"Security analysis and enhancements of 3GPP authentication and key agreement protocol","volume":"4","author":"Zhang","year":"2005","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1109\/TWC.2008.061080","article-title":"An efficient mobile authentication scheme for wireless networks","volume":"7","author":"Tang","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_14","unstructured":"(2012). 3rd Generation Partnership Project, 3GPP Organizational Partners. Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture (Rel 12) 3GPP TS 33.401 V12.5.0."},{"key":"ref_15","unstructured":"(2008). 3GPP EPS\/EPC Security Architecture, 3GPP Organizational Partners. 3GPP TS 33.401, System Architecture Evolution (SAE)-Security architecture EPS (EPC and E-UTRAN) Security Architecture."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Zhu, F., Wong, D.S., Chan, A.H., and Ye, R. (2002, January 12\u201313). Password authenticated key exchange based on RSA for imbalanced wireless networks. Proceedings of the 5th International Conference on Information Security, London, UK.","DOI":"10.1007\/3-540-45811-5_11"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/49.223865","article-title":"Protecting poorly chosen secrets from guessing attacks","volume":"11","author":"Gong","year":"1993","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_18","unstructured":"Aydemir, O., and Selcuk, A.A. (2005, January 13\u201315). A strong user authentication protocol for GSM. Proceedings of the 14th IEEE International Workshop on Enabling Technologies Infrastructure for Collaborative Enterprise (WETICE\u201905), Linkopings, Sweden."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ammayappan, K., Saxena, A., and Negi, A. (2006, January 20\u201323). Mutual authentication and key agreement based on elliptic curve cryptography for GSM. Proceedings of the 14th International Conference on Advanced Computing and Communications (ADCOM), Mangalore, India.","DOI":"10.1109\/ADCOM.2006.4289879"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1049\/ip-com:20030290","article-title":"Extension of authentication protocol for GSM","volume":"150","author":"Lee","year":"2003","journal-title":"IEE Proc. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.comcom.2005.01.015","article-title":"Efficient authentication protocols of GSM","volume":"28","author":"Chang","year":"2005","journal-title":"Comput. Commun."},{"key":"ref_22","unstructured":"Al-Tawil, K., Akram, A., and Youssef, H. (1998, January 11\u201314). A new authentication protocol for GSM networks. Proceedings of the IEEE 23rd Annual Conference on Local Computer Networks (LCN\u201998), Washington, DC, USA."},{"key":"ref_23","unstructured":"Lin, W.D., and Jan, J.K. (2001, January 3\u20135). A wireless-based authentication and anonymous channels for large scale area. Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC\u201901), Hammamet, Tunisia."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1016\/j.comcom.2004.05.018","article-title":"Privacy and authentication protocol providing anonymous channels in GSM","volume":"27","author":"Alberto","year":"2004","journal-title":"Comput. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"El Zouka, H.A. (2015). Providing end-to-end secure communicationsin gsm networks. Int. J. Netw. Secur. Its Appl. IJNSA, 7.","DOI":"10.5121\/ijnsa.2015.7402"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lescuyer, P., and Lucidarme, T. (2008). Evolved Packet System (EPS): The LTE and SAE Evolution of 3G, John Wiley & Sons.","DOI":"10.1002\/9780470723678"},{"key":"ref_27","unstructured":"(2008). Third Generation Partnership Project (3GPP), 3GPP TS 33.102 v8.0.0. 3G Security: Security Architecture, 3GPP Organizational Partners. Release 8."},{"key":"ref_28","unstructured":"(2008). Third Generation Partnership Project (3GPP), 3GPP TS 33.401 v8.1.1 3G System Architecture Evolution (SAE): Security Architecture, 3GPP Organizational Partners. Release 8."},{"key":"ref_29","unstructured":"(2007). Third Generation Partnership Project (3GPP), 3GPP TS 33.821 v1.0.0. Rationale and Track of Security Decisions in Long Term Evolved (LTE) RAN\/3GPP System Architecture Evolution (SAE), 3GPP Organizational Partners. Release 8."},{"key":"ref_30","first-page":"54","article-title":"SHA-based mutual authentication in long term evolution using hyper elliptic curve cryptography","volume":"1","author":"Sandhya","year":"2013","journal-title":"Int. J. Emerg. Sci. Eng. (IJESE)"},{"key":"ref_31","first-page":"126","article-title":"Novel authentication algorithm-public key based cryptography in mobile phone systems","volume":"6","author":"Imre","year":"2006","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Mun, H., Han, K., and Kim, K. (2009, January 22\u201324). 3G-WLAN Interworking: Security analysis and new authentication and key agreement based on EAP-AKA. Proceedings of the IEEE Wireless Telecommunications Symposium WTS, Prague, Czech Republic.","DOI":"10.1109\/WTS.2009.5068983"},{"key":"ref_33","first-page":"184","article-title":"Performance evaluation of public key-based authentication in future mobile communication systems","volume":"1","author":"Kambourakis","year":"2004","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_34","unstructured":"Zheng, Y., He, D., Tang, X., and Wang, H. (2005, January 6\u20139). AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. Proceedings of the 2005 Fifth International Conference on Information, Communications and Signal Processing, Bangkok, Thailand."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.comcom.2010.04.041","article-title":"An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks","volume":"34","author":"Xu","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","article-title":"Security enhancement on a new authentication scheme with anonymity for wireless environments","volume":"53","author":"Lee","year":"2006","journal-title":"IEEE Trans. Indus. Electron."},{"key":"ref_37","first-page":"230","article-title":"A new authentication scheme with anonymity for wireless environments","volume":"50","author":"Zhu","year":"2004","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_38","first-page":"57","article-title":"SEPS-AKA: A secure evolved packet system authentication and key agreement scheme for LTE-A networks","volume":"58","author":"Haddad","year":"2014","journal-title":"Comput. Sci. Inf. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Abdo, J.B., Demerjian, J., Chaouchi, H., and Pujolle, G. (2013, January 20\u201322). EC-AKA2 a revolutionary aka protocol. Proceedings of the 2013 International Conference on Computer Applications Technology (ICCAT), Sousse, Tunisia.","DOI":"10.1109\/ICCAT.2013.6521993"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Abdo, J.B., Demerjian, J., Ahmad, K., Chaouchi, H., and Pujolle, G. (2013, January 21\u201324). EPS mutual authentication and crypt-analyzing SP-AKA. Proceedings of the 2013 International Conference on Computing, Management and Telecommunications (ComManTel), Ho Chi Minh City, Vietnam.","DOI":"10.1109\/ComManTel.2013.6482410"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"3492","DOI":"10.1016\/j.comnet.2013.08.003","article-title":"SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks","volume":"57","author":"Lai","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_42","unstructured":"Jing, Q., Zhang, Y., Fu, A., and Liu, X. (2011, January 5\u20139). A privacy preserving handover authentication scheme for EAP-based wireless networks. Proceedings of the 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), Houston, TX, USA."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Kim, Y., Ren, W., Jo, J., Yang, M., Jiang, Y., and Zheng, J. (2007, January 24\u201328). SFRIC: A secure Fast roaming scheme in wireless LAN using ID-based cryptography. Proceedings of the 2007 IEEE International Conference on Communications ICC, Glasgow, Scotland.","DOI":"10.1109\/ICC.2007.263"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/LCOMM.2010.01.091607","article-title":"A Handover authentication using credentials based on chameleon hashing","volume":"14","author":"Choi","year":"2010","journal-title":"IEEE Commun. Lett."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1016\/j.comnet.2012.02.012","article-title":"A simple and robust handover authentication between HeNB and eNB in LTE networks","volume":"56","author":"Cao","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","article-title":"Enhance authentication scheme with anonymity for roaming service in global mobility networks","volume":"32","author":"Chang","year":"2009","journal-title":"Comput. Commun."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","article-title":"A strong user authentication scheme with smart cards for wireless communications","volume":"34","author":"He","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Gope, P., and Hwang, T. (2015). Lightweight and energy efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J.","DOI":"10.1007\/s11277-015-2344-z"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2015.12.003","article-title":"An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks","volume":"62","author":"Gope","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.comnet.2014.10.009","article-title":"Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks","volume":"75","author":"Zhang","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"4509","DOI":"10.1109\/TVT.2011.2168247","article-title":"S-AKA: A provable and secure authentication key agreement protocol for UMTS networks","volume":"60","author":"Huang","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.comnet.2003.09.001","article-title":"Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems","volume":"44","author":"Park","year":"2004","journal-title":"Comput. Netw."},{"key":"ref_53","unstructured":"Palekar, A., Simon, D., Josefsson, S., Zhou, H., and Zorn, G. Protected EAP Protocol (PEAP) Version 2, IETF, October 2004. Available online: https:\/\/www.ietf.org\/archive\/id\/draft-josefsson-pppext-eap-tls-eap-10.txt."},{"key":"ref_54","unstructured":"Han, L. (2006). A Threat Analysis of the Extensible Authentication Protocol, Carleton University. Honors Project Report."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Ramadan, M., Li, F., Xu, C.X., Abdalla, A., and Abdalla, H. (2016, January 12\u201314). An efficient end-to-end mutual authentication scheme for 2G-GSM system. Proceedings of the 2016 IEEE International Conference on Big Data Analysis (ICBDA 2016), Hangzhou, China.","DOI":"10.1109\/ICBDA.2016.7509848"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Ramadan, M., Li, F., Xu, C.X., Oteng, K., and Ibrahim, H. (2015, January 6\u20137). Authentication and key agreement scheme for CDMA cellular system. Proceedings of the 2015 IEEE International Conference on Communication Software and Networks (ICCSN), Chengdu, China.","DOI":"10.1109\/ICCSN.2015.7296138"},{"key":"ref_57","first-page":"769","article-title":"User-to-user mutual authentication and key agreement scheme for LTE cellular system","volume":"18","author":"Ramadan","year":"2016","journal-title":"Int. J. Netw. Secur."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"D\u2019Orazio, C.J., Choo, K.R., and Yang, L.T. (2016). Data exfiltration from internet of things devices: iOS devices as case studies. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2016.2569094"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s11277-013-1501-5","article-title":"Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets","volume":"77","author":"Hwang","year":"2014","journal-title":"Wirel. Pers. Commun."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"D\u2019Orazio, C., Ariffin, A., and Choo, K.R. (2014, January 6\u20139). iOS anti-forensics: How can we securely conceal, delete and insert data?. Proceedings of the 2014 47th Hawaii International Conference on System Science, Waikoloa, HI, USA.","DOI":"10.1109\/HICSS.2014.594"},{"key":"ref_61","unstructured":"Do, Q., Martini, B., and Choo, K.R. (2016). Software: Practice and Experience (Softw. Pract. Exper.), Wiley Online Library."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Do, Q., Martini, B., and Choo, K.R. (2015). A forensically sound adversary model for mobile devices. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0138449"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s10660-015-9208-1","article-title":"Android mobile VoIP apps: A survey and examination of their security and privacy","volume":"16","author":"Azfar","year":"2016","journal-title":"Electron. Commer. Res."},{"key":"ref_64","first-page":"389","article-title":"An efficient certificate-less designated verifier signature scheme","volume":"10","author":"He","year":"2013","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.compeleceng.2011.05.009","article-title":"An efficient identity-based blind signature scheme without bilinear pairings","volume":"37","author":"Hea","year":"2011","journal-title":"Comput. Electr. Eng."},{"key":"ref_66","unstructured":"Scott, M. (2003). MIRACLE-Multiprecision Integer and Rational Arithmetic C\/C++ Library, Shamus Software Ltd."},{"key":"ref_67","first-page":"229","article-title":"EEE-GSM: End-to-End Encryption Scheme over GSM System","volume":"10","author":"Ramadan","year":"2016","journal-title":"Int. J. Secur. Appl."},{"key":"ref_68","unstructured":"Al-Riyami, S., and Paterson, G. (2003). Advances in Cryptology-ASIACRYPT, Springer."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"622","DOI":"10.3390\/info5040622","article-title":"Protection method for data communication between ADS-B sensor and next-generation air traffic control systems","volume":"5","author":"Lee","year":"2014","journal-title":"Information"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"704","DOI":"10.3390\/info6040704","article-title":"Batch attribute-based encryption for secure clouds","volume":"6","author":"Yang","year":"2015","journal-title":"Information"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/8\/9\/85\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:29:17Z","timestamp":1760210957000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/8\/9\/85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,26]]},"references-count":70,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2016,9]]}},"alternative-id":["sym8090085"],"URL":"https:\/\/doi.org\/10.3390\/sym8090085","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2016,8,26]]}}}