A Subscriber Identity Module for the IMT-2030 System
DOI:
https://doi.org/10.13052/jmm1550-4646.2215Keywords:
IMT-2030, 6G access security, authentication and key agreement, subscriber identity moduleAbstract
In this paper we argue that the upcoming 6G mobile system should have a new subscriber identity module (SIM). The SIM application used today, the USIM, is functionally the same as the 3G SIM (which dates back to 1999). The SIM holds the subscriber security credentials and algorithms,and these are used during the authentication and key agreement (AKA) procedures. That makes the 4G EPS-AKA and the 5G-AKA protocols, in important ways, restricted by the USIM functionality. This situation should be rectified, and our proposal is for a new 6G-SIM application and a new 6G baseline AKA (6G-BAKA) protocol.
Downloads
References
ITU-R. Future technology trends of terrestrial International Mobile Telecommunications systems towards 2030 and beyond. Report M.2516-0, ITU, 11 2022.
ITU-R. Framework and overall objectives of the future development of IMT for 2030 and beyond. Recommendation M.2160-0, ITU, 11 2023.
GSMA. Security Algorithm Deployment Guidance. Permanent Reference Document FS.35 v3.0, GSMA, 04 2022.
3GPP. TS 33.205 - Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General. Technical Specification 35.205 v19.0.0, 3GPP, 03 2025.
3GPP. TS 33.206 - Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification. Technical Specification 35.206 v18.0.0, 3GPP, 03 2024.
NIST. Advanced Encryption Standard (AES). Federal Information Processing Standards Publication FIPS 197, NIST, 05 2023.
3GPP. TS 33.207 - Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors’ test data. Technical Specification 35.207 v18.0.0, 3GPP, 03 2024.
3GPP. TS 33.208 - Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data. Technical Specification 35.208 v18.0.0, 3GPP, 03 2024.
ETSI. Smart Cards; UICC-Terminal interface; Physical and logical characteristics. Technical Specification ETSI TS 102 221 v18.2.0, ETSI, 06 2024.
ETSI. Secure Elements; Additional UICC form factors and environmental conditions; Physical and logical characteristics. Technical Specification ETSI TS 102 671 v18.1.0, ETSI, 09 2024.
GSMA. RSP Architetcure. Technical Specification SGP.21 v3.1, GSMA, 12 2023.
GSMA. RSP Technical Specification. Technical Specification SGP.22 v3.1, GSMA, 12 2023.
Geir M. Køien. The SUCI-AKA authentication protocol for 5G systems. Wireless Personal Communications, (3).
3GPP. TS 33.102 - 3G Security; Security architecture. Technical Specification 33.102 v19.1.0, 3GPP, 06 2025.
3GPP. TS 33.401 - Security architecture. Technical Specification 33.401 v19.0.0, 3GPP, 07 2025.
3GPP. TS 33.501 - Security architecture and procedures for 5G system. Technical Specification 33.501 v19.3.0, 3GPP, 07 2025.
Shahzana Liaqat and Geir M. Køien. Analysis of eSIM/iSIM for Critical Communications. In Kevin Daimi and Abeer Al Sadoon, editors, Proceedings of the Third International Conference on Innovations in Computing Research (ICR’24), pages 441–448. Springer Nature Switzerland, 2024.
Meltem Sönmez Turan, Kerry McKay, Jinkeon Kang, John Kelsey, and Donghoon Chang. Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions. Special Publication NIST SP 800-232, NIST, 08 2025.
Pawani Porambage, Gürkan Gür, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei Gurtov, and Mika Ylianttila. The roadmap to 6g security and privacy. IEEE Open Journal of the Communications Society, 2:1094–1122, 2021.
DongHyun Je, Jungsoo Jung, and Sunghyun Choi. Toward 6g security: Technology trends, threats, and solutions. IEEE Communications Standards Magazine, 5(3):64–71, 2021.
Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, and Ying-Dar Lin. Security and privacy for 6g: A survey on prospective technologies and challenges. IEEE Communications Surveys & Tutorials, 23(4):2384–2428, 2021.
Volker Ziegler, Peter Schneider, Harish Viswanathan, Michael Montag, Satish Kanugovi, and Ali Rezaki. Security and trust in the 6g era. IEEE Access, 9:142314–142327, 2021.
Jong Hyuk Park and Minji Kim. Quantum-resilient security for 6g networks: a comprehensive survey on challenges, solutions, and research opportunities. The Journal of Supercomputing, 81(9):1086, 2025.
Togu Novriansyah Turnip, Birger Andersen, and Cesar Vargas-Rosales. Towards 6g authentication and key agreement protocol: A survey on hybrid post quantum cryptography. IEEE Communications Surveys & Tutorials, pages 1–1, 2025.
Geir M. Køien. Access Security in 6G: The 6G-ACE Protocol (A Concept Proposal), chapter 5, pages 93–121. River Publishers, 1 edition, 08 2024.
Elaine Barker, Lily Chen, David Cooper, Dustin Moody, Andrew Regenscheid, Murugiah Souppaya, Bill Newhouse, Russ Housley, Sean Turner, William Barker, and Karen Scarfone. Considerations for Achieving Crypto Agility. Cybersecurity White Paper CSWP 39, NIST, 12 2025.
Peter Gutmann and Stephan Neuhaus. Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog. Cryptology ePrint Archive, Paper 2025/1237, 2025.
Michele Mosca and Marco Piani. Quantum threat timeline report 2024, 12 2024.
Lennart Baumgärtner, Benjamin Klein, Niko Mohr, Anika Pflanzer, and Henning Soller. When—and how— to prepare for post-quantum cryptography, 05 2022.
NIST. Module-Lattice-Based Key-Encapsulation Mechanism Standard. Federal Information Processing Standards Publication 203, NIST, 08 2023.
E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3. Standards Track RFC 8446, IETF, 08 2018.
F. Yergeau. UTF-8, a transformation format of ISO 10646. Standards Track RFC 3629, IETF, 11 2003.



