Abstract: The authentication process in fifth-generation networks between the user equipment and the network relies on secure communication protocols, with the 5G authentication and key agreement ...